keyStore is : nodes/java/self.jks keyStore type is : jks keyStore provider is : init keystore init keymanager of type SunX509 *** found key for : tst chain [0] = [ [ Version: V3 Subject: CN=self, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 17889955001411032043509880224962971196637784455650659255274506731580497774305919111954895019003180961259880236227393943819361568527247667124512557411604922175536003392569034305714297546667750177220263611263595492038787810898960025359469653017835721989067777895358882852324095784841079169143746750638639292266522939669335757583922496627878893678663752152707696165887754471495217933030508589003925884302720275856091784312456370324740579095923519042004276420928363999081049225856983415483601235594222281601034639147113242928156695539024910572665274144443937513709567041936022415293087656497130653224983905363385613011031 public exponent: 65537 Validity: [From: Wed Mar 05 14:35:56 CET 2014, To: Thu Mar 05 14:35:56 CET 2015] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ 04] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 98 8F 2E 73 2E 6A 09 04 B7 8E 26 79 9E 6D 8A 51 ...s.j....&y.m.Q 0010: A0 30 F2 15 .0.. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 60 83 4D 71 CD 97 7C 17 34 13 A3 2D 56 23 39 C8 `.Mq....4..-V#9. 0010: 69 4B D2 D7 98 E1 BD 53 D3 A0 31 88 AC FE 9E B3 iK.....S..1..... 0020: 8A 1C 6A 4B D1 1F 66 F0 EF 04 17 ED E2 9B AA 4C ..jK..f........L 0030: 1D DB 45 63 95 21 91 81 41 47 AA 11 33 FF 42 70 ..Ec.!..AG..3.Bp 0040: A7 EF 87 67 A9 EB 35 AA 05 B3 1F 4D FE 91 AA 66 ...g..5....M...f 0050: E6 D9 DF EC 5B 2B 86 8E 5C 69 A7 2F 0B 6E FD 43 ....[+..\i./.n.C 0060: FC 7E EB 22 9C A3 02 F7 A8 DF 0B C5 37 9A 02 F0 ..."........7... 0070: 34 FA C9 C7 F0 1F DC 9F 39 5B AD E3 42 5F 2B 03 4.......9[..B_+. ] chain [1] = [ [ Version: V3 Subject: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 147570881504645885487005756979657312350895080874986473503131942686843335182799772066440808812478290896899196349927425161577425228303543774740040584216046542836028918683869177639763925379213116764175921252067053110976717586556715228948822722610401013299634933679178010512484404712924759678611594850313942305931 public exponent: 65537 Validity: [From: Mon Feb 17 16:14:21 CET 2014, To: Sat Feb 16 16:14:21 CET 2019] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ eabc3ee1 c5f964f3] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: A7 EB 46 93 44 15 C7 A1 E9 F2 EC 8E A8 A9 E7 B1 ..F.D........... 0010: 2A 9B 85 31 0D A4 89 A7 BF 94 7C 72 3C 36 20 47 *..1.......r<6 G 0020: 23 21 D0 24 5A 76 30 07 88 07 9C 76 42 37 10 68 #!.$Zv0....vB7.h 0030: B1 42 93 AF F5 DF 5E 01 6A 2C 88 35 90 EB 40 C5 .B....^.j,.5..@. 0040: EF 4B 86 D8 01 D4 09 89 5F 03 23 E4 7B 66 61 A4 .K......_.#..fa. 0050: 18 96 C0 B9 AF FA 50 19 52 A0 F4 10 FA 9B EB 64 ......P.R......d 0060: 41 4F F4 5D 78 BC 4C 45 FA 17 1E 0A 52 59 3C A4 AO.]x.LE....RY<. 0070: 2B BD FC 07 B3 E0 F1 67 D8 D1 95 A2 51 B0 B0 DA +......g....Q... ] *** trustStore is: CA/java/truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Subject: CN=tstprojekt, O=TST Projekt, ST=Bayern, C=DE Issuer: CN=tstprojekt, O=TST Projekt, ST=Bayern, C=DE Algorithm: RSA; Serial number: 0x36625e2 Valid from Mon Feb 17 16:14:22 CET 2014 until Sun May 18 17:14:22 CEST 2014 adding as trusted cert: Subject: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Algorithm: RSA; Serial number: 0xeabc3ee1c5f964f3 Valid from Mon Feb 17 16:14:21 CET 2014 until Sat Feb 16 16:14:21 CET 2019 trigger seeding of SecureRandom done seeding SecureRandom Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1394106517 bytes = { 35, 245, 11, 185, 69, 64, 251, 101, 55, 209, 72, 95, 63, 74, 27, 25, 75, 42, 62, 86, 178, 120, 173, 106, 185, 178, 115, 63 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] *** main, WRITE: TLSv1 Handshake, length = 163 main, READ: TLSv1 Handshake, length = 2180 *** ServerHello, TLSv1 RandomCookie: GMT: 1394106517 bytes = { 91, 65, 61, 190, 17, 203, 177, 112, 67, 113, 203, 54, 111, 55, 23, 95, 79, 242, 237, 168, 244, 2, 24, 46, 163, 33, 86, 39 } Session ID: {83, 24, 97, 149, 194, 115, 147, 60, 231, 202, 161, 227, 223, 96, 28, 244, 163, 144, 211, 76, 192, 137, 149, 37, 158, 80, 125, 111, 148, 147, 170, 186} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] ** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=tstbounce11, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 18609330669488940266260546571336387112497023648397553986285623673522893779374368064312796078620802044926033827103443256803605157624783252826243476896604024368326917322262549818826961226292151530364022122384493350267643930974940832785406986263839185866241704794949578554184500850607948330127378859820559836090708248222552204364652222023348904243992427523681267167273026197494241911182284031872556928877715936560889937440935757845795965536145500226054471944869712612387132200722540333474099969967231242109082061538319694319846686237567749585036106105337520618613627300509165176147463193596377140164613736366275318355759 public exponent: 65537 Validity: [From: Thu Mar 06 11:56:30 CET 2014, To: Fri Mar 06 11:56:30 CET 2015] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ 11] Certificate Extensions: 5 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ IPAddress: 192.168.56.30 ] [5]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: AC C1 2B 86 1F 36 3C E1 4E 30 35 BE E0 3E 9B B1 ..+..6<.N05..>.. 0010: F6 29 78 BB .)x. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 65 B2 36 54 8C BA 0A 02 27 D8 89 BB 8E 00 81 A1 e.6T....'....... 0010: 3D D5 F4 4D 0F 88 8E 45 2C 7F 0E 8C 6D CA 24 15 =..M...E,...m.$. 0020: F7 D8 47 EC 98 FF 23 4E 43 33 E8 23 5B EA 7C 6F ..G...#NC3.#[..o 0030: 65 28 2B CF B0 0C 9E 6B 87 25 5A F4 A3 59 6B C6 e(+....k.%Z..Yk. 0040: 95 C1 13 AE AA 45 E2 F4 DD 8F 12 F2 62 AF 49 EC .....E......b.I. 0050: 35 D4 15 5E B8 D8 63 8B BF A3 4E AE F1 E9 88 F3 5..^..c...N..... 0060: DD 30 E0 20 3E 7B 49 10 F2 8A 9D 5D BC B0 99 08 .0. >.I....].... 0070: B8 03 CA 59 0A 80 2D 87 E6 6A 12 20 81 38 94 82 ...Y..-..j. .8.. ] chain [1] = [ [ Version: V3 Subject: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 147570881504645885487005756979657312350895080874986473503131942686843335182799772066440808812478290896899196349927425161577425228303543774740040584216046542836028918683869177639763925379213116764175921252067053110976717586556715228948822722610401013299634933679178010512484404712924759678611594850313942305931 public exponent: 65537 Validity: [From: Mon Feb 17 16:14:21 CET 2014, To: Sat Feb 16 16:14:21 CET 2019] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ eabc3ee1 c5f964f3] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: A7 EB 46 93 44 15 C7 A1 E9 F2 EC 8E A8 A9 E7 B1 ..F.D........... 0010: 2A 9B 85 31 0D A4 89 A7 BF 94 7C 72 3C 36 20 47 *..1.......r<6 G 0020: 23 21 D0 24 5A 76 30 07 88 07 9C 76 42 37 10 68 #!.$Zv0....vB7.h 0030: B1 42 93 AF F5 DF 5E 01 6A 2C 88 35 90 EB 40 C5 .B....^.j,.5..@. 0040: EF 4B 86 D8 01 D4 09 89 5F 03 23 E4 7B 66 61 A4 .K......_.#..fa. 0050: 18 96 C0 B9 AF FA 50 19 52 A0 F4 10 FA 9B EB 64 ......P.R......d 0060: 41 4F F4 5D 78 BC 4C 45 FA 17 1E 0A 52 59 3C A4 AO.]x.LE....RY<. 0070: 2B BD FC 07 B3 E0 F1 67 D8 D1 95 A2 51 B0 B0 DA +......g....Q... ] *** Found trusted certificate: [ [ Version: V3 Subject: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 147570881504645885487005756979657312350895080874986473503131942686843335182799772066440808812478290896899196349927425161577425228303543774740040584216046542836028918683869177639763925379213116764175921252067053110976717586556715228948822722610401013299634933679178010512484404712924759678611594850313942305931 public exponent: 65537 Validity: [From: Mon Feb 17 16:14:21 CET 2014, To: Sat Feb 16 16:14:21 CET 2019] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ eabc3ee1 c5f964f3] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: A7 EB 46 93 44 15 C7 A1 E9 F2 EC 8E A8 A9 E7 B1 ..F.D........... 0010: 2A 9B 85 31 0D A4 89 A7 BF 94 7C 72 3C 36 20 47 *..1.......r<6 G 0020: 23 21 D0 24 5A 76 30 07 88 07 9C 76 42 37 10 68 #!.$Zv0....vB7.h 0030: B1 42 93 AF F5 DF 5E 01 6A 2C 88 35 90 EB 40 C5 .B....^.j,.5..@. 0040: EF 4B 86 D8 01 D4 09 89 5F 03 23 E4 7B 66 61 A4 .K......_.#..fa. 0050: 18 96 C0 B9 AF FA 50 19 52 A0 F4 10 FA 9B EB 64 ......P.R......d 0060: 41 4F F4 5D 78 BC 4C 45 FA 17 1E 0A 52 59 3C A4 AO.]x.LE....RY<. 0070: 2B BD FC 07 B3 E0 F1 67 D8 D1 95 A2 51 B0 B0 DA +......g....Q... ] *** ECDH ServerKeyExchange Server key: Sun EC public key, 256 bits public x coord: 48761127163364952669966600875697560243942799587059594078964529143062924989525 public y coord: 12039192383638927302637175255245388912001746453341930282105698625849707189691 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone matching alias: tst *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=self, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 17889955001411032043509880224962971196637784455650659255274506731580497774305919111954895019003180961259880236227393943819361568527247667124512557411604922175536003392569034305714297546667750177220263611263595492038787810898960025359469653017835721989067777895358882852324095784841079169143746750638639292266522939669335757583922496627878893678663752152707696165887754471495217933030508589003925884302720275856091784312456370324740579095923519042004276420928363999081049225856983415483601235594222281601034639147113242928156695539024910572665274144443937513709567041936022415293087656497130653224983905363385613011031 public exponent: 65537 Validity: [From: Wed Mar 05 14:35:56 CET 2014, To: Thu Mar 05 14:35:56 CET 2015] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ 04] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 98 8F 2E 73 2E 6A 09 04 B7 8E 26 79 9E 6D 8A 51 ...s.j....&y.m.Q 0010: A0 30 F2 15 .0.. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 60 83 4D 71 CD 97 7C 17 34 13 A3 2D 56 23 39 C8 `.Mq....4..-V#9. 0010: 69 4B D2 D7 98 E1 BD 53 D3 A0 31 88 AC FE 9E B3 iK.....S..1..... 0020: 8A 1C 6A 4B D1 1F 66 F0 EF 04 17 ED E2 9B AA 4C ..jK..f........L 0030: 1D DB 45 63 95 21 91 81 41 47 AA 11 33 FF 42 70 ..Ec.!..AG..3.Bp 0040: A7 EF 87 67 A9 EB 35 AA 05 B3 1F 4D FE 91 AA 66 ...g..5....M...f 0050: E6 D9 DF EC 5B 2B 86 8E 5C 69 A7 2F 0B 6E FD 43 ....[+..\i./.n.C 0060: FC 7E EB 22 9C A3 02 F7 A8 DF 0B C5 37 9A 02 F0 ..."........7... 0070: 34 FA C9 C7 F0 1F DC 9F 39 5B AD E3 42 5F 2B 03 4.......9[..B_+. ] chain [1] = [ [ Version: V3 Subject: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 147570881504645885487005756979657312350895080874986473503131942686843335182799772066440808812478290896899196349927425161577425228303543774740040584216046542836028918683869177639763925379213116764175921252067053110976717586556715228948822722610401013299634933679178010512484404712924759678611594850313942305931 public exponent: 65537 Validity: [From: Mon Feb 17 16:14:21 CET 2014, To: Sat Feb 16 16:14:21 CET 2019] Issuer: EMAILADDRESS=saul.hazledine@jambit.com, CN=tstprojektCA, O=TST Projekt, ST=Bayern, C=DE SerialNumber: [ eabc3ee1 c5f964f3] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 45 38 23 98 7B E8 46 B2 BE 9F 1A C1 67 29 64 D9 E8#...F.....g)d. 0010: D7 B9 30 0A ..0. ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: A7 EB 46 93 44 15 C7 A1 E9 F2 EC 8E A8 A9 E7 B1 ..F.D........... 0010: 2A 9B 85 31 0D A4 89 A7 BF 94 7C 72 3C 36 20 47 *..1.......r<6 G 0020: 23 21 D0 24 5A 76 30 07 88 07 9C 76 42 37 10 68 #!.$Zv0....vB7.h 0030: B1 42 93 AF F5 DF 5E 01 6A 2C 88 35 90 EB 40 C5 .B....^.j,.5..@. 0040: EF 4B 86 D8 01 D4 09 89 5F 03 23 E4 7B 66 61 A4 .K......_.#..fa. 0050: 18 96 C0 B9 AF FA 50 19 52 A0 F4 10 FA 9B EB 64 ......P.R......d 0060: 41 4F F4 5D 78 BC 4C 45 FA 17 1E 0A 52 59 3C A4 AO.]x.LE....RY<. 0070: 2B BD FC 07 B3 E0 F1 67 D8 D1 95 A2 51 B0 B0 DA +......g....Q... ] *** *** ECDHClientKeyExchange ECDH Public value: { 4, 38, 53, 130, 62, 24, 144, 108, 167, 137, 226, 114, 62, 22, 168, 37, 130, 20, 247, 25, 160, 68, 18, 86, 145, 147, 91, 243, 166, 83, 205, 17, 26, 227, 107, 174, 58, 101, 148, 149, 56, 36, 44, 130, 43, 176, 40, 214, 197, 152, 102, 119, 85, 212, 172, 253, 226, 241, 155, 232, 18, 96, 211, 81, 40 } main, WRITE: TLSv1 Handshake, length = 1600 SESSION KEYGEN: PreMaster Secret: 0000: 7F A0 AE 3D A3 3C B8 2A 40 24 F3 58 3D 7B 26 54 ...=.<.*@$.X=.&T 0010: 8D 61 07 E4 2D D5 92 D6 3F 3E 17 CB 88 27 1E 97 .a..-...?>...'.. CONNECTION KEYGEN: Client Nonce: 0000: 53 18 61 95 23 F5 0B B9 45 40 FB 65 37 D1 48 5F S.a.#...E@.e7.H_ 0010: 3F 4A 1B 19 4B 2A 3E 56 B2 78 AD 6A B9 B2 73 3F ?J..K*>V.x.j..s? Server Nonce: 0000: 53 18 61 95 5B 41 3D BE 11 CB B1 70 43 71 CB 36 S.a.[A=....pCq.6 0010: 6F 37 17 5F 4F F2 ED A8 F4 02 18 2E A3 21 56 27 o7._O........!V' Master Secret: 0000: 93 4E E0 34 23 98 4E 4E 88 4A AE 9A FC 1F 1F C6 .N.4#.NN.J...... 0010: C5 11 F4 6B 94 2E B7 9C D2 95 90 98 DA A7 B1 AE ...k............ 0020: 17 62 3B 20 33 36 0A BB A5 F2 DF 0E D0 11 B8 D7 .b; 36.......... Client MAC write Secret: 0000: A1 7C 0E AD 29 F9 4D F5 63 36 45 04 18 11 82 23 ....).M.c6E....# 0010: AD 6D CA 4D .m.M Server MAC write Secret: 0000: A6 45 69 95 51 89 A1 5C F0 A8 02 E7 09 31 1D FD .Ei.Q..\.....1.. 0010: 67 F0 1F EF g... Client write key: 0000: 3C 88 10 45 31 9E FE 7C 24 34 75 73 41 96 1D FF <..E1...$4usA... 0010: 1E 7B C3 7D D9 F7 25 4D 08 DC 2C 15 A6 D5 B3 74 ......%M..,....t Server write key: 0000: F4 F9 13 57 B0 F6 2E FC BD B2 15 45 29 E6 1A 96 ...W.......E)... 0010: 7A 90 44 D8 52 F6 99 FF F1 B9 0B 7A A4 AB 6B 77 z.D.R......z..kw Client write IV: 0000: 4B C3 F9 89 87 49 10 48 D0 B0 C5 31 CB B9 93 80 K....I.H...1.... Server write IV: 0000: 19 5B BA 99 5D 02 0B 28 B6 C5 D6 8D 59 29 4D ED .[..]..(....Y)M. *** CertificateVerify main, WRITE: TLSv1 Handshake, length = 262 main, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 71, 199, 217, 38, 36, 12, 86, 197, 23, 57, 62, 89 } *** main, WRITE: TLSv1 Handshake, length = 48 main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 153, 144, 11, 125, 177, 178, 228, 180, 128, 203, 227, 48 } *** %% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] main, WRITE: TLSv1 Application Data, length = 208 main, READ: TLSv1 Application Data, length = 720 main, READ: TLSv1 Application Data, length = 32 main, READ: TLSv1 Application Data, length = 32 [{"name":"/*","resources":0,"cachedSize":null}]