You can't do this in the current implementation of TLS -- a "password"
that is checked per-session is an application-layer issue, not a
protocol-layer issue.  It's handled on webservers by either having
them require Basic authentication even after a successful SSL/TLS
handshake (possibly including client certificate), and then it's
re-sent on every connection that requires that realm.

-Kyle H

On 4/2/06, michael Dorrian <[EMAIL PROTECTED]> wrote:
> I am not talking about the pem pass phrase here. I want a last line of
> authentication from the client. I want the server to have a list of common
> names of clients it trusts. With these client names also a client password
> will be stored on the server side. At runtime the server asks for this
> password before the ssl connection can be opened. Also the user name is got
> from the client certificates common name. How is this usually done and is
> there a function that does this?.
>
>  ________________________________
> Blab-away for as little as 1ยข/min. Make PC-to-Phone Calls using Yahoo!
> Messenger with Voice.
>
>
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to