使用java SSL的IBM MQ错误代码2397

使用java SSL的IBM MQ错误代码2397,java,ibm-mq,Java,Ibm Mq,我正在尝试使用java代码设置双向SSl。我成功地做到了一个方面,即服务器证书从我这边得到验证,但当涉及到两个方面时,我得到一个2397错误代码 我所采取的步骤是: 使用Keytool创建具有自签名证书的密钥库,并将其部署到MQ服务器的信任库中 为MQ服务器创建密钥库并创建自签名证书 在我的信任库中部署MQ服务器的证书 然后我试着运行我的java代码。这在没有SSL或单向SSL的情况下可以正常工作,但如果失败,则可以进行双向握手。下面是代码和堆栈跟踪: //code to create

我正在尝试使用java代码设置双向SSl。我成功地做到了一个方面,即服务器证书从我这边得到验证,但当涉及到两个方面时,我得到一个2397错误代码

我所采取的步骤是:

  • 使用Keytool创建具有自签名证书的密钥库,并将其部署到MQ服务器的信任库中
  • 为MQ服务器创建密钥库并创建自签名证书
  • 在我的信任库中部署MQ服务器的证书
  • 然后我试着运行我的java代码。这在没有SSL或单向SSL的情况下可以正常工作,但如果失败,则可以进行双向握手。下面是代码和堆栈跟踪:

        //code to create MQ connectivity
        public static void main(String [] args){
        System.setProperty("javax.net.debug","ssl");
        //keystore path
        System.setProperty("javax.net.ssl.keyStore", "C:/keystores/keystore.jks");              
        System.setProperty("javax.net.ssl.keyStorePassword", "password");
        //trsutstore path
        System.setProperty("javax.net.ssl.trustStore", "C:/keystores/truststore.jks");
        System.setProperty("javax.net.ssl.trustStorePassword", "password");
        //cipher spec          
         MQEnvironment.sslCipherSuite = "SSL_RSA_WITH_NULL_MD5";
         MQEnvironment.hostname = "*****-ws3717";//system name
         MQEnvironment.port = 1414;
         MQEnvironment.channel = "channel_name";//channel name
         MQQueueManager qm = null;
         try {  qm = new MQQueueManager("QMNGR");
             System.out.println("Conn Successs!!!");
         } catch (MQException e) {
             e.printStackTrace();
         } 
         finally {
             try {
                 qm.disconnect();
             } catch (Exception e) {
                 e.printStackTrace();
                 e.getCause();
             }
         }
         } }
    
    堆栈跟踪如下所示:

    keyStore is : C:/keystores/keystore.jks
    keyStore type is : jks
    keyStore provider is : 
    init keystore
    init keymanager of type SunX509
    ***
    found key for : selfsigned
    chain [0] = [
    [
      Version: V3
      Subject: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
      Key:  Sun RSA public key, 1024 bits
      modulus: 132473562370742919150140985227175013875110053845431438145351913928668686945002725183702560702247749924970161010103451411451345824467592557656888776558245848713650717773344294766986771753500118311618188922138349812131167438364266468003061810102502957510761089213138803410346480285664890149111581898928681089463
      public exponent: 65537
      Validity: [From: Fri May 25 13:54:00 IST 2012,
                   To: Sat May 25 13:54:00 IST 2013]
      Issuer: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      SerialNumber: [    4fbf41a0]
    ]
      Algorithm: [MD5withRSA]
      Signature:
    0000: 46 D0 CC DF AB 5F 6F D3   37 33 E1 64 F7 1B F7 3F  F...._o.73.d...?
    0010: 98 95 06 09 F9 84 C8 3A   65 CF A7 24 BB 46 95 DF  .......:e..$.F..
    0020: 8B 30 F2 BC 5C F9 CC 31   E4 36 53 43 BB 50 1B EF  .0..\..1.6SC.P..
    0030: 8C 9B DB C0 41 C9 2C 37   AD B6 1D 30 BF 6E 75 E4  ....A.,7...0.nu.
    0040: A9 05 E7 30 5A B1 30 84   6B 8E B7 7A 83 2D 33 01  ...0Z.0.k..z.-3.
    0050: A1 44 86 A0 11 30 C3 4D   5B 68 7E 0B 09 48 03 CC  .D...0.M[h...H..
    0060: DF C5 97 AD 87 40 DC 2A   9A 3D ED FC 27 D3 8B 4F  .....@.*.=..'..O
    0070: F0 21 02 E8 62 6B 05 63   57 BB E8 4D 33 EA 35 9E  .!..bk.cW..M3.5.
    ]
    ***
    trustStore is: C:\keystores\truststore.jks
    trustStore type is : jks
    trustStore provider is : 
    init truststore
    adding as trusted cert:
      Subject: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Issuer:  CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Algorithm: RSA; Serial number: 0x4fbf4261
      Valid from Fri May 25 13:57:13 IST 2012 until Sat May 25 13:57:13 IST 2013
    trigger seeding of SecureRandom
    done seeding SecureRandom
    Allow unsafe renegotiation: false
    Allow legacy hello messages: true
    Is initial handshake: true
    Is secure renegotiation: false
    %% No cached client session
    *** ClientHello, SSLv3
    RandomCookie:  GMT: 1321485794 bytes = { 138, 193, 95, 113, 86, 252, 250, 50, 154, 121, 73, 8, 93, 116, 115, 184, 182, 142, 240, 205, 15, 250, 172, 171, 111, 5, 122, 52 }
    Session ID:  {}
    Cipher Suites: [SSL_RSA_WITH_NULL_MD5]
    Compression Methods:  { 0 }
    Extension renegotiation_info, renegotiated_connection: <empty>
    ***
    main, WRITE: SSLv3 Handshake, length = 52
    main, READ: SSLv3 Handshake, length = 4875
    *** ServerHello, SSLv3
    RandomCookie:  GMT: 1321485794 bytes = { 250, 173, 248, 90, 241, 136, 107, 119, 99, 92, 80, 19, 223, 223, 152, 131, 216, 115, 242, 56, 198, 135, 156, 111, 210, 234, 220, 103 }
    Session ID:  {240, 31, 0, 0, 80, 56, 194, 89, 112, 238, 203, 154, 79, 75, 68, 48, 106, 203, 19, 130, 88, 88, 88, 88, 226, 70, 196, 79, 13, 0, 0, 0}
    Cipher Suite: SSL_RSA_WITH_NULL_MD5
    Compression Method: 0
    ***
    Warning: No renegotiation indication extension in ServerHello
    %% Created:  [Session-1, SSL_RSA_WITH_NULL_MD5]
    ** SSL_RSA_WITH_NULL_MD5
    *** Certificate chain
    chain [0] = [
    [
      Version: V3
      Subject: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
      Key:  Sun RSA public key, 1024 bits
      modulus: 105605049659295333895264877648371480987144339115417104117025065956957634413900327625548229515098843172709660865042903412409581107015480309223474293490705595126088958625491899627683399717294708677347640098462040771799700233921554682196524988217754821345297656825451441457385676164016790486091736694366149540953
      public exponent: 65537
      Validity: [From: Fri May 25 13:57:13 IST 2012,
                   To: Sat May 25 13:57:13 IST 2013]
      Issuer: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      SerialNumber: [    4fbf4261]
    ]
      Algorithm: [MD5withRSA]
      Signature:
    0000: 81 F5 2C 2A 77 63 F1 CD   D8 31 E1 BE B5 9B 28 C5  ..,*wc...1....(.
    0010: 6B EA 24 BB 5C 3D EB D0   EB E3 86 2E D7 1C 0D 92  k.$.\=..........
    0020: 36 A2 79 13 BC 74 40 C4   BF 7C F7 1B 05 8C 6B CF  6.y..t@.......k.
    0030: EB 2C C2 0D E3 40 F7 F0   95 66 B6 85 AE 84 66 C9  .,...@...f....f.
    0040: B7 C5 29 BE 71 1F 28 C0   83 1C 94 41 08 2A 44 45  ..).q.(....A.*DE
    0050: 99 FD C5 77 28 26 FC 50   A3 69 32 BD F5 8B 0C A6  ...w(&.P.i2.....
    0060: 13 21 0F BA B2 C6 A2 71   18 17 94 31 3B 7E 88 63  .!.....q...1;..c
    0070: C0 01 76 DC 60 47 BB 3F   2F 7E 2A 73 84 DA 60 79  ..v.`G.?/.*s..`y
    ]
    ***
    Found trusted certificate:
    [
    [
      Version: V3
      Subject: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
      Key:  Sun RSA public key, 1024 bits
      modulus: 105605049659295333895264877648371480987144339115417104117025065956957634413900327625548229515098843172709660865042903412409581107015480309223474293490705595126088958625491899627683399717294708677347640098462040771799700233921554682196524988217754821345297656825451441457385676164016790486091736694366149540953
      public exponent: 65537
      Validity: [From: Fri May 25 13:57:13 IST 2012,
                   To: Sat May 25 13:57:13 IST 2013]
      Issuer: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      SerialNumber: [    4fbf4261]
    ]
      Algorithm: [MD5withRSA]
      Signature:
    0000: 81 F5 2C 2A 77 63 F1 CD   D8 31 E1 BE B5 9B 28 C5  ..,*wc...1....(.
    0010: 6B EA 24 BB 5C 3D EB D0   EB E3 86 2E D7 1C 0D 92  k.$.\=..........
    0020: 36 A2 79 13 BC 74 40 C4   BF 7C F7 1B 05 8C 6B CF  6.y..t@.......k.
    0030: EB 2C C2 0D E3 40 F7 F0   95 66 B6 85 AE 84 66 C9  .,...@...f....f.
    0040: B7 C5 29 BE 71 1F 28 C0   83 1C 94 41 08 2A 44 45  ..).q.(....A.*DE
    0050: 99 FD C5 77 28 26 FC 50   A3 69 32 BD F5 8B 0C A6  ...w(&.P.i2.....
    0060: 13 21 0F BA B2 C6 A2 71   18 17 94 31 3B 7E 88 63  .!.....q...1;..c
    0070: C0 01 76 DC 60 47 BB 3F   2F 7E 2A 73 84 DA 60 79  ..v.`G.?/.*s..`y
    ]
    *** CertificateRequest
    Cert Types: RSA
    Cert Authorities:
    <EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
    <EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
    <EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA>
    <EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA>
    <EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA>
    <CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    <CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    <CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    <CN=VeriSign Class 4 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    <OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US>
    <OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US>
    <OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US>
    <OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 4 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US>
    <OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
    <OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
    <OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
    <CN=VeriSign Class 3 Secure Server CA, OU=Terms of use at https://www.verisign.com/rpa (c)05, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    <CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US>
    <CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net>
    <CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US>
    <CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net>
    <CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net>
    <CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN>
    *** ServerHelloDone
    matching alias: selfsigned
    *** Certificate chain
    chain [0] = [
    [
      Version: V3
      Subject: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
    
      Key:  Sun RSA public key, 1024 bits
      modulus: 132473562370742919150140985227175013875110053845431438145351913928668686945002725183702560702247749924970161010103451411451345824467592557656888776558245848713650717773344294766986771753500118311618188922138349812131167438364266468003061810102502957510761089213138803410346480285664890149111581898928681089463
      public exponent: 65537
      Validity: [From: Fri May 25 13:54:00 IST 2012,
                   To: Sat May 25 13:54:00 IST 2013]
      Issuer: CN=Pooja Joshi, OU=SGW, O=SUNGARD, L=PUNE, ST=MH, C=IN
      SerialNumber: [    4fbf41a0]
    ]
      Algorithm: [MD5withRSA]
      Signature:
    0000: 46 D0 CC DF AB 5F 6F D3   37 33 E1 64 F7 1B F7 3F  F...._o.73.d...?
    0010: 98 95 06 09 F9 84 C8 3A   65 CF A7 24 BB 46 95 DF  .......:e..$.F..
    0020: 8B 30 F2 BC 5C F9 CC 31   E4 36 53 43 BB 50 1B EF  .0..\..1.6SC.P..
    0030: 8C 9B DB C0 41 C9 2C 37   AD B6 1D 30 BF 6E 75 E4  ....A.,7...0.nu.
    0040: A9 05 E7 30 5A B1 30 84   6B 8E B7 7A 83 2D 33 01  ...0Z.0.k..z.-3.
    0050: A1 44 86 A0 11 30 C3 4D   5B 68 7E 0B 09 48 03 CC  .D...0.M[h...H..
    0060: DF C5 97 AD 87 40 DC 2A   9A 3D ED FC 27 D3 8B 4F  .....@.*.=..'..O
    0070: F0 21 02 E8 62 6B 05 63   57 BB E8 4D 33 EA 35 9E  .!..bk.cW..M3.5.
    ]
    ***
    *** ClientKeyExchange, RSA PreMasterSecret, SSLv3
    main, WRITE: SSLv3 Handshake, length = 711
    SESSION KEYGEN:
    PreMaster Secret:
    0000: 03 00 3D 04 C8 EF 08 83   A4 EF 85 1C D9 96 A0 77  ..=............w
    0010: 32 2A A5 43 14 98 11 6F   DD 01 52 73 4D DF B4 5A  2*.C...o..RsM..Z
    0020: C5 2E FC 2A C0 F6 C2 9B   11 23 B2 C0 7B 59 E8 96  ...*.....#...Y..
    CONNECTION KEYGEN:
    Client Nonce:
    0000: 4F C4 46 E2 8A C1 5F 71   56 FC FA 32 9A 79 49 08  O.F..._qV..2.yI.
    0010: 5D 74 73 B8 B6 8E F0 CD   0F FA AC AB 6F 05 7A 34  ]ts.........o.z4
    Server Nonce:
    0000: 4F C4 46 E2 FA AD F8 5A   F1 88 6B 77 63 5C 50 13  O.F....Z..kwc\P.
    0010: DF DF 98 83 D8 73 F2 38   C6 87 9C 6F D2 EA DC 67  .....s.8...o...g
    Master Secret:
    0000: C0 20 A8 BC D1 A7 06 B0   C5 07 CA A7 83 C5 35 9E  . ............5.
    0010: 20 AB B6 28 8C 7E EF 14   CB 9D C1 ED C5 62 F8 A1   ..(.........b..
    0020: 6A DE 9F AF 16 5B 2F 1D   21 8F A3 2C F7 B9 3D 36  j....[/.!..,..=6
    Client MAC write Secret:
    0000: 09 E8 CE 6C D1 2D 43 86   7E 74 1C 5F 68 DA E2 AE  ...l.-C..t._h...
    Server MAC write Secret:
    0000: CE 62 DA F7 2C F2 2B 4A   AD 47 8F 61 BD 58 51 BD  .b..,.+J.G.a.XQ.
    ... no encryption keys used
    ... no IV used for this cipher
    *** CertificateVerify
    main, WRITE: SSLv3 Handshake, length = 134
    main, WRITE: SSLv3 Change Cipher Spec, length = 1
    *** Finished
    verify_data:  { 4, 127, 139, 212, 93, 181, 170, 62, 121, 196, 243, 156, 251, 103, 206, 222, 2, 10, 84, 35, 186, 251, 144, 6, 31, 97, 135, 179, 160, 127, 204, 93, 100, 140, 74, 79 }
    ***
    main, WRITE: SSLv3 Handshake, length = 56
    main, waiting for close_notify or alert: state 1
    main, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
    main, handling exception: java.net.SocketException: Software caused connection abort: recv failed
    MQJE001: An MQException occurred: Completion Code 2, Reason 2397
    MQJE030: IOException during security flows
    MQJE001: Completion Code 2, Reason 2397
    com.ibm.mq.MQException: MQJE001: Completion Code 2, Reason 2397
        at com.ibm.mq.MQManagedConnectionJ11.<init>(MQManagedConnectionJ11.java:219)
        at com.ibm.mq.MQClientManagedConnectionFactoryJ11._createManagedConnection(MQClientManagedConnectionFactoryJ11.java:318)
        at com.ibm.mq.MQClientManagedConnectionFactoryJ11.createManagedConnection(MQClientManagedConnectionFactoryJ11.java:338)
        at com.ibm.mq.StoredManagedConnection.<init>(StoredManagedConnection.java:84)
        at com.ibm.mq.MQSimpleConnectionManager.allocateConnection(MQSimpleConnectionManager.java:168)
        at com.ibm.mq.MQQueueManagerFactory.obtainBaseMQQueueManager(MQQueueManagerFactory.java:772)
        at com.ibm.mq.MQQueueManagerFactory.procure(MQQueueManagerFactory.java:697)
        at com.ibm.mq.MQQueueManagerFactory.constructQueueManager(MQQueueManagerFactory.java:657)
        at com.ibm.mq.MQQueueManagerFactory.createQueueManager(MQQueueManagerFactory.java:153)
        at com.ibm.mq.MQQueueManager.<init>(MQQueueManager.java:451)
        at com.test.SSlTest.main(SSlTest.java:68)
    Caused by: java.net.SocketException: Software caused connection abort: recv failed
        at java.net.SocketInputStream.socketRead0(Native Method)
        at java.net.SocketInputStream.read(SocketInputStream.java:129)
        at com.sun.net.ssl.internal.ssl.InputRecord.readFully(InputRecord.java:293)
        at com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:331)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:798)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.waitForClose(SSLSocketImpl.java:1493)
        at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(HandshakeOutStream.java:103)
        at com.sun.net.ssl.internal.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:689)
        at com.sun.net.ssl.internal.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:985)
        at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:904)
        at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:238)
        at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:593)
        at com.sun.net.ssl.internal.ssl.Handshaker.process_record(Handshaker.java:529)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:893)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1138)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1165)
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1149)
        at com.ibm.mq.SSLHelper.configureSSLSocket(SSLHelper.java:567)
        at com.ibm.mq.SSLHelper.createSSLSocket(SSLHelper.java:150)
        at com.ibm.mq.MQInternalCommunications.createSocketConnection(MQInternalCommunications.java:2264)
        at com.ibm.mq.MQv6InternalCommunications$1.run(MQv6InternalCommunications.java:157)
        at java.security.AccessController.doPrivileged(Native Method)
        at com.ibm.mq.MQv6InternalCommunications.initialize(MQv6InternalCommunications.java:154)
        at com.ibm.mq.MQv6InternalCommunications.<init>(MQv6InternalCommunications.java:102)
        at com.ibm.mq.MQSESSIONClient.MQCONNX(MQSESSIONClient.java:1337)
        at com.ibm.mq.MQSESSIONClient.MQCONN(MQSESSIONClient.java:1246)
        at com.ibm.mq.MQManagedConnectionJ11.<init>(MQManagedConnectionJ11.java:184)
        ... 10 more
    
    keyStore是:C:/keystores/keyStore.jks
    密钥库类型为:jks
    密钥库提供程序是:
    初始化密钥库
    SunX509类型的初始化密钥管理器
    ***
    找到的密钥:自签名
    链[0]=[
    [
    版本:V3
    主题:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    签名算法:MD5withRSA,OID=1.2.840.113549.1.1.4
    密钥:Sun RSA公钥,1024位
    模数:13247356237074291915014098522717501387511100538454314381453519139286686945002725183702570224774992497016100103451411451345824467592557688877655824587136507177733494768617535001831618892213874384646800306181010250295107610889138410410480642866901491115891089463
    公众指数:65537
    有效期:[自:2012年5月25日星期五13:54:00,
    收件人:2013年5月25日星期六13:54:00]
    发行人:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    序列号:[4fbf41a0]
    ]
    算法:[MD5withRSA]
    签名:
    0000:46 D0 CC DF AB 5F 6F D3 37 33 E1 64 F7 1B F7 3F….第73.d.号命令。。。?
    0010:98 95 06 09 F9 84 C8 3A 65 CF A7 24 BB 46 95 DF….:e..F。。
    0020:8B 30 F2 BC 5C F9 CC 31 E4 36 53 BB 50 1B EF.0....1.6SC.P。。
    0030:8C 9B DB C0 41 C9 2C 37 AD B6 1D 30 BF 6E 75 E4…A.,7…0.nu。
    0040:A9 05 E7 30 5A B1 30 84 6B 8E B7 7A 83 2D 33 01…0Z.0.k..z-3。
    0050:A1 44 86 A0 11 30 C3 4D 5B 68 7E 0B 09 48 03立方厘米直径…0.M[h…h。。
    0060:DF C5 97 AD 87 40 DC 2A 9A 3D ED FC 27 D3 8B 4F…@.*.='..O
    0070:F0 21 02 E8 62 6B 05 63 57 BB E8 4D 33 EA 35 9E.!…bk.cW..M3.5。
    ]
    ***
    信任库是:C:\keystores\trustStore.jks
    信任库类型为:jks
    信任库提供程序是:
    初始化信任库
    添加为受信任证书:
    主题:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    发行人:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    算法:RSA;序列号:0x4fbf4261
    有效期为2012年5月25日星期五13:57:13 IST至2013年5月25日星期六13:57:13 IST
    随机触发种子
    随机完成
    允许不安全的重新协商:false
    允许旧版hello消息:true
    第一次握手是否正确
    是否安全重新谈判:错误
    %%没有缓存的客户端会话
    ***克利恩泰罗,SSLv3
    RandomCookie:GMT:1321485794字节={138、193、95、113、86、252、250、50、154、121、73、8、93、116、115、184、182、142、240、205、15250、172、171、111、5、122、52}
    会话ID:{}
    密码套件:[SSL\u RSA\u带\u NULL\u MD5]
    压缩方法:{0}
    扩展重新协商\u信息,重新协商的\u连接:
    ***
    main,WRITE:SSLv3握手,长度=52
    主,读:SSLv3握手,长度=4875
    ***服务器你好,SSLv3
    RandomCookie:GMT:1321485794字节={250、173、248、90、241、136、107、119、99、92、80、19、223、223、152、131、216、115、242、56、198、135、156、111、210、234、220、103}
    会话ID:{240、31、0、0、80、56、194、89、112、238、203、154、79、75、68、48、106、203、19、130、88、88、88、88、226、70196、79、13、0、0、0}
    密码套件:SSL\u RSA\u带\u NULL\u MD5
    压缩方法:0
    ***
    警告:ServerHello中没有重新协商指示扩展
    %%已创建:[会话1,SSL\u RSA\u和\u NULL\u MD5]
    **SSL\u RSA\u带\u NULL\u MD5
    ***证书链
    链[0]=[
    [
    版本:V3
    主题:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    签名算法:MD5withRSA,OID=1.2.840.113549.1.1.4
    密钥:Sun RSA公钥,1024位
    模数:10560504965929533389526487764837148098714433911541710411702506595957634390032762554829515098843172709660852903412409581107015480309223474293490770551260889625489189962768339971947086764009846204717997002339215546821965288217754821345265656525451457367616409090916694366149953
    公众指数:65537
    有效期:[自:2012年5月25日星期五13:57:13,
    收件人:2013年5月25日星期六13:57:13]
    发行人:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    序列号:[4fbf4261]
    ]
    算法:[MD5withRSA]
    签名:
    0000:81 F5 2C 2A 77 63 F1 CD D8 31 E1 BE B5 9B 28 C5….,*wc…1。
    0010:6B EA 24 BB 5C 3D EB D0 EB E3 86 2E D7 1C 0D 92 k.$\=。。。。。。。。。。
    0020:36 A2 79 13 BC 74 40 C4 BF 7C F7 1B 05 8C 6B CF 6.y。。t@.......k.
    0030:EB 2C C2 0D E3 40 F7 F0 95 66 B6 85 AE 84 66 C9.,…@…f…f。
    0040:B7 C5 29 BE 71 1F 28 C0 83 1C 94 41 08 2A 44 45.)
    0050:99 FD C5 77 28 26 FC 50 A3 69 32 BD F5 8B 0C A6…w(&P.i2…)。。。。。
    0060:13 21 0F BA B2 C6 A2 71 18 17 94 31 3B 7E 88 63.!…q…1;.c
    0070:C001 76 DC 60 47 BB 3F 2F 7E 2A 73 84 DA 60 79..v.`G.?/*s..y
    ]
    ***
    找到受信任的证书:
    [
    [
    版本:V3
    主题:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    签名算法:MD5withRSA,OID=1.2.840.113549.1.1.4
    密钥:Sun RSA公钥,1024位
    模数:10560504965929533389526487764837148098714433911541710411702506595957634390032762554829515098843172709660852903412409581107015480309223474293490770551260889625489189962768339971947086764009846204717997002339215546821965288217754821345265656525451457367616409090916694366149953
    公众指数:65537
    有效期:[自:2012年5月25日星期五13:57:13,
    收件人:2013年5月25日星期六13:57:13]
    发行人:CN=Pooja Joshi,OU=SGW,O=SUNGARD,L=PUNE,ST=MH,C=IN
    序列号:[4fbf4261]
    ]
    算法:[MD5withRSA]
    信号