https://bz.apache.org/bugzilla/show_bug.cgi?id=62748
--- Comment #28 from Mark Thomas <ma...@apache.org> --- Once I figured out how to do it, it was fairly simple. Essentially, we now use the same approach for NIO[2]+OpenSSL for TLSv1.2 and TLS1.3. Requesting the client certificate triggers a re-handshake with extra bits depending on the protocol. We artificially extend the handshake until the client certificates have been provided. That way we piggy-back on the existing I/O code. Next up - back-ports. -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org