silly me.. didn't notice the line in the server response of the second case:

verify depth is 1, must return a certificate
Using default temp DH parameters
ACCEPT
SSL_accept:before/accept initialization
SSL_accept:SSLv3 read client hello A
SSL_accept:SSLv3 write server hello A
SSL_accept:SSLv3 write certificate A
SSL_accept:SSLv3 write key exchange A
SSL_accept:SSLv3 write certificate request A
SSL_accept:SSLv3 flush data
depth=1 C = aa, ST = a, L = a, O = a, OU = a, CN = cc, emailAddress = a
verify error:num=19:self signed certificate in certificate chain
verify return:1
depth=1 C = aa, ST = a, L = a, O = a, OU = a, CN = cc, emailAddress = a
verify return:1
depth=0 C = aa, ST = a, O = a, OU = a, CN = ac, emailAddress = a
verify return:1
SSL_accept:SSLv3 read client certificate A
...

yeah.. so everything was all right.. openssl just didn't disconnect after
auth failure.. event though it should!
-- 
View this message in context: 
http://old.nabble.com/confused-with-openssl-server-client-behavior-tp32396398p32398717.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to