• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/

Lines Matching refs:nickname

261  * Determine whether the nickname passed in is a filename that needs to
262 * be loaded as a PEM or a regular NSS nickname.
265 * returns 0 for not a file (NSS nickname)
281 /* Check if the given string is filename or nickname of a certificate. If the
283 * recognized as nickname, return a duplicated string. The returned string
293 /* no such file exists, use the string as nickname */
299 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
390 char *nickname = NULL;
399 nickname = aprintf("PEM Token #1:%s", n);
400 if(nickname) {
401 cert = PK11_FindCertFromNickname(nickname, NULL);
405 free(nickname);
776 const char *nickname = connssl->client_nickname;
821 if(SECSuccess != NSS_GetClientAuthData((void *)nickname, sock, caNames,
825 if(NULL == nickname)
826 failf(data, "NSS: client certificate not found (nickname not "
829 failf(data, "NSS: client certificate not found: %s", nickname);
834 /* get certificate nickname if any */
835 nickname = (*pRetCert)->nickname;
836 if(NULL == nickname)
837 nickname = "[unknown]";
840 failf(data, "NSS: private key not found for certificate: %s", nickname);
844 infof(data, "NSS: using client certificate: %s\n", nickname);
1327 char *nickname = dup_nickname(data, STRING_CERT);
1328 if(nickname) {
1344 /* store the nickname for SelectClientCert() called during handshake */
1345 connssl->client_nickname = nickname;
1400 char *nickname = dup_nickname(data, STRING_SSL_ISSUERCERT);
1401 if(nickname) {
1403 ret = check_issuer_cert(connssl->handle, nickname);
1404 free(nickname);