Frans Gunawan wrote:
Hello, How to test client auth with the "openssl s_server" and "openssl s_client" to show that the authentication is using the client auth.Thank you,Frans
Quoted from s_server-manpage (http://www.openssl.org/docs/apps/s_server.html):
*
*So if you use this option on the server the client must authenticate. Is it this you were asking?**-verify depth*, *-Verify depth** The verify depth to use. This specifies the maximum length of the client certificate chain and makes the server request a certificate from the client. With the *-verify* option a certificate is requested but the client does not have to send one, with the *-Verify* option the client must supply a certificate or an error occurs.
Hope it helps. Ted ;) -- PGP Public Key Information Download complete Key from http://www.convey.de/ted/tedkey_convey.asc Key fingerprint = 31B0 E029 BCF9 6605 DAC1 B2E1 0CC8 70F4 7AFB 8D26
smime.p7s
Description: S/MIME Cryptographic Signature