https://bz.apache.org/bugzilla/show_bug.cgi?id=62748

--- Comment #28 from Mark Thomas <ma...@apache.org> ---
Once I figured out how to do it, it was fairly simple. Essentially, we now use
the same approach for NIO[2]+OpenSSL for TLSv1.2 and TLS1.3. Requesting the
client certificate triggers a re-handshake with extra bits depending on the
protocol. We artificially extend the handshake until the client certificates
have been provided. That way we piggy-back on the existing I/O code.

Next up - back-ports.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to