具有p12证书的Https客户端java

具有p12证书的Https客户端java,java,https,client,Java,Https,Client,我在一个项目中苦苦挣扎了一段时间,该项目包括从具有Https连接的服务器调用方法。 我得到一个404代码,但是地址存在,所以证书有问题 到目前为止,我有以下代码: System.setProperty("javax.net.ssl.keyStoreType", "pkcs12"); System.setProperty("javax.net.ssl.trustStoreType", "jks"); System.setProperty("javax.net.ssl.keyStor

我在一个项目中苦苦挣扎了一段时间,该项目包括从具有Https连接的服务器调用方法。 我得到一个404代码,但是地址存在,所以证书有问题

到目前为止,我有以下代码:

System.setProperty("javax.net.ssl.keyStoreType", "pkcs12");
    System.setProperty("javax.net.ssl.trustStoreType", "jks");
    System.setProperty("javax.net.ssl.keyStore", "./cert/walkiriaapps_dev_cert.p12");
    System.setProperty("javax.net.ssl.trustStore", "./cert/gridserver.keystore");
    System.setProperty("javax.net.debug", "ssl");
    System.setProperty("javax.net.ssl.trustStorePassword", trustStorePassword);
    System.setProperty("javax.net.ssl.keyStorePassword", keyStorePassword);

    try {
        SSLSocketFactory sslsocketfactory = (SSLSocketFactory) SSLSocketFactory.getDefault();
        URL url = new URL(SERVER_URL);
        HttpsURLConnection conn = (HttpsURLConnection)url.openConnection();
        conn.setSSLSocketFactory(sslsocketfactory);

        System.out.println(conn.getResponseCode());
        InputStream inputstream = conn.getInputStream();
        InputStreamReader inputstreamreader = new InputStreamReader(inputstream);
        BufferedReader bufferedreader = new BufferedReader(inputstreamreader);

        String string = null;
        while ((string = bufferedreader.readLine()) != null) {
            System.out.println("Received " + string);
        }
    } catch (MalformedURLException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    } catch (IOException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    }
启用调试后,我将获得以下信息:

keyStore is : ./cert/walkiriaapps_dev_cert.p12 keyStore type is : pkcs12 keyStore provider is :  init keystore init keymanager of type SunX509
*** found key for : [hidden by me ;)] chain [0] = [ [   Version: V3   Subject: [hidden by me ;)]   Signature Algorithm: SHA1withRSA, OID
=xxxxxx

  Key:  Sun RSA public key, 2048 bits   modulus: 25618728526980407715404586197565746577652430166924543443958281662634742897052603095095758511147901575124400320179797331860716646860486870953395736561894316707521150349144946687953313723171397095268376530520667100869163032007829998448800202165918944214576419025925092328986301138158279604039024071057779082107833750510476901348232496212394760754318237941183777058043657818962756546399885751494495606397844915051787505208471929043203878929121386289922849774283250681494624102067989726841385828897870956338426474470018535626512167695988102150213586310503588030098931234831662882919587388701417158847960514277726029356783 public exponent: 65537   Validity: [From: Sat Jul 02 12:29:45 CEST 2016,
               To: Sun Jul 02 12:29:45 CEST 2017]   Issuer: [hidden by me ;)]   SerialNumber: [    02]

Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0 86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C            8w., ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:false   PathLen: undefined ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   DigitalSignature   Key_Encipherment   Data_Encipherment   Key_Agreement ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 19 49 F6 4E CD 69 10 5E   3D 97 2C 09 4C 57 2B 65  .I.N.i.^=.,.LW+e 0010: FD 32 3E B3 80 B0 9B D6   9C 67 27 F2 BC B4 97 A7  .2>......g'..... 0020: D7 BC 71 B6 3A B6 39 02   94 34 97 32 2E 74 A2 35  ..q.:.9..4.2.t.5 0030: 30 C5 2A 99 4F D0 1B 64   B1 3B 0A 69 18 68 A8 73  0.*.O..d.;.i.h.s 0040: 5A 26 3B 61 A6 18 C7 A3   D7 85 8C 7D 5B 07 08 69  Z&;a........[..i 0050: 6A 32 AC 2B 7A F8 E6 42   07 84 BA A6 E4 F1 AD B6  j2.+z..B........ 0060: E5 FB 78 55 97 27 80 ED   49 49 54 E8 D0 E2 96 09  ..xU.'..IIT..... 0070: 1B 75 D7 4A 53 C5 70 8B   CF 76 60 65 9D 1D 39 0E  .u.JS.p..v`e..9. 0080: 32 39 88 7C C4 7B 48 3D   C3 FF 73 C5 7E 65 B1 08 
29....H=..s..e.. 0090: 1B 56 60 B2 45 87 09 50   14 7C 30 20 CD EC 33 78  .V`.E..P..0 ..3x 00A0: B9 46 47 36 E8 58 AA 03   DA DC F6 0D C7 0B E5 24  .FG6.X.........$ 00B0: 36 4A F2 D6 32 93 CF A6   83 E0 82 70 85 29 A7 34  6J..2......p.).4 00C0: 03 9F 16 93 C3 15 43 6E   FE 8C 20 26 38 0F B2 F4  ......Cn.. &8... 00D0: C8 AC 5F 0F 2D 40 2A 2E   EC 47 49 F6 AD D3 67 03  .._.-@*..GI...g. 00E0: E6 DF BA DC 47 38 E1 68   92 1D 52 C8 A0 A7 CE 91  ....G8.h..R..... 00F0: C1 FF 21 59 F1 E9 F6 7B   2D 80 00 02 C7 52 43 08  ..!Y....-....RC.

]
*** trustStore is: ./cert/gridserver.keystore trustStore type is : jks trustStore provider is :  init truststore adding as trusted cert:   Subject: [hidden by me ;)]   Issuer:  C[hidden by me ;)]   Algorithm: RSA; Serial number: 0x2   Valid from Sun Jun 05 18:14:09 CEST 2016 until Sat Jun 05 18:14:09 CEST 2021

trigger seeding of SecureRandom done seeding SecureRandom Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called %% No cached client session
*** ClientHello, TLSv1 RandomCookie:  GMT: 1451660641 bytes = { 57, 105, 46, 174, 145, 121, 25, 154, 153, 98, 42, 167, 8, 12, 239, 100, 189, 241, 227, 213, 2, 113, 124, 68, 83, 172, 29, 43 } Session ID:  {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods:  { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1} Extension ec_point_formats, formats: [uncompressed] Extension server_name, server_name: [host_name: demo.iquvo.com]
*** main, WRITE: TLSv1 Handshake, length = 130 main, READ: TLSv1 Handshake, length = 89
*** ServerHello, TLSv1 RandomCookie:  GMT: -1444518719 bytes = { 36, 208, 126, 45, 135, 54, 250, 142, 92, 198, 36, 156, 192, 11, 103, 194, 152, 198, 167, 103, 143, 118, 208, 42, 70, 245, 183, 60 } Session ID:  {23, 159, 75, 230, 109, 209, 13, 253, 76, 213, 99, 240, 87, 145, 195, 170, 169, 39, 162, 123, 163, 19, 46, 187, 67, 117, 144, 64, 92, 177, 195, 191} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
*** %% Initialized:  [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA main, READ: TLSv1 Handshake, length = 982
*** Certificate chain chain [0] = [ [   Version: V3   Subject: CN=demo.iquvo.com, OU=iquvo Systems, O=iquvo, L=Madrid, ST=Madrid, C=ES   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits   modulus: 23453645515854966924301205454696625328671479972464738543799836932127583641533813201400570740442560086912845820094275679055549988049658631777847332739248681132642932519165249875037014213452555762465878771543919238414780931857222019527866816147448967113080291383819384893029975957613712051652474661438461078816940552511636651932730286186599058948852155547351329972057697689307521243133360393947364340527532395277333228473022288074415918366159232974257664555640802067520693478750525144409451882709715874673237455724895036797475043632724593718904286605604489464163002898051877745616161768837246505670061362321331950680997 public exponent: 65537   Validity: [From: Tue Jul 12 23:42:19 CEST 2016,
               To: Sat Jun 05 18:14:09 CEST 2021]   Issuer: [hidden by me ;)]   SerialNumber: [    03]

Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0 86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C            8w., ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:false   PathLen: undefined ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   emailProtection   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   DigitalSignature   Key_Encipherment   Data_Encipherment   Key_Agreement ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 45 64 14 E0 A0 20 C0 86   EC 28 23 69 B1 93 D7 15  Ed... ...(#i.... 0010: A1 5C 19 80 20 8A BF E8   00 AF A6 C1 D5 98 4B BA  .\.. .........K. 0020: EC BC F4 20 3E 04 AE 2A   AD D6 9D E8 CD 5E 22 DB  ... >..*.....^". 0030: 54 38 87 AC 3E C9 AE DC   F9 F4 EA AF 90 68 53 8A  T8..>........hS. 0040: 95 E9 18 4E 71 60 A8 55   C8 93 D7 EF 05 2C A9 0F  ...Nq`.U.....,.. 0050: AA 54 D0 27 A4 8F 57 58   63 0E 02 5E 6D ED A1 8F  .T.'..WXc..^m... 0060: EC B9 6E 58 49 D1 B2 FF   F9 A4 19 06 83 B9 3B 12  ..nXI.........;. 0070: DA 62 2D B1 9B EC FB 52   DC 1A 5B 32 4A 14 3F EC  .b-....R..[2J.?. 0080: 2D 5F 1C 86 90 29 D9 89   A7 B0 76 DA 2C 17 98 A1 
-_...)....v.,... 0090: 81 C7 22 E8 AD 52 1A 88   D3 19 24 D9 E0 63 56 04  .."..R....$..cV. 00A0: 5A C7 AC 00 7F 90 84 0F   44 F9 3C 5F 45 C8 2B F2  Z.......D.<_E.+. 00B0: 55 7F C6 EE B8 82 4F B0   E6 42 9D 66 1C CD D3 C0  U.....O..B.f.... 00C0: 00 36 31 EB 65 6B 94 BC   82 4D 07 53 21 B9 A3 66  .61.ek...M.S!..f 00D0: 5A C9 40 A8 2D B0 BB 73   84 94 9F 5B D7 81 F2 E3  Z.@.-..s...[.... 00E0: 15 9B D3 F6 A1 8E 02 1B   E6 61 2A 78 27 28 8F 9C  .........a*x'(.. 00F0: 3F 3D 78 A9 3A 27 A3 6D   92 20 4D B2 21 0F FE 98  ?=x.:'.m. M.!...

]
*** Found trusted certificate: [ [   Version: V3   Subject: [hidden by me ;)]   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits   modulus: 21150877640234016381111274098046984118683206683014739756833065339354409251839034422389305077192144292296518982097404972859365369550733381248230874970257083954569244169241161038537457114078913978977609733079736696758855067361535741860901054811684551240975716527800277810041882930012408864592120187014516031281102491071972501707919016868527591234611111398168176959894432634785347671362404715931317393588706237672365619642155446754496385612099649836213550463477173184091172816433791766397039664840301452611626359011252247894238973019470395261962737635899132289408179107156743574679199231017113344711234513933791463056697 public exponent: 65537   Validity: [From: Sun Jun 05 18:14:09 CEST 2016,
               To: Sat Jun 05 18:14:09 CEST 2021]   Issuer: CN=iquvo Root CA, OU=IT, O=iquvo, L=Madrid, ST=Madrid, C=ES   SerialNumber: [   02]

Certificate Extensions: 5 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 2F 23 F4 86 C9 49 F1 6B 6D 7A 04 16 EE C9 51 E3  /#...I.kmz....Q. 0010: 62 AE C1 F0            b... ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:true PathLen:2147483647 ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   Key_Encipherment   Data_Encipherment   Key_Agreement   Key_CertSign ]

[5]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0   86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C                                 8w., ] ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 56 16 97 C3 4A 99 48 EB   B8 B9 DC 8D 86 3C 35 88  V...J.H......<5. 0010: 7A 41 29 D5 3E 60 C6 2C   A0 94 31 CB 80 AD 30 25  zA).>`.,..1...0% 0020: DE 31 62 16 FC EF 84 94   64 CD F7 68 59 11 D8 EA  .1b.....d..hY... 0030: 39 0A C1 E3 86 CF B1 EC   B0 1F 3C 31 FD 27 CA B3  9.........<1.'.. 0040: 52 E9 AF 69 BC F0 D7 E3   E1 43 CB 5A 1B 66 1B 39  R..i.....C.Z.f.9 0050: 06 79 40 53 40 FF FA 6E   A6 76 A0 31 4D 4B DA 6F  .y@S@..n.v.1MK.o 0060: 72 02 E6 F0 37 B5 33 98   60 C8 7B 38 EA FE BC 5F  r...7.3.`..8..._ 0070: D1 47 7F 9D 16 7B 02 3E   47 C6 15 1A 98 9F 80 EE  .G.....>G....... 0080: A7 36 96 37 0D 21 F8 89   99 F7 31 EF 2A 6F AA AC  .6.7.!....1.*o.. 0090: 1F 5D F4 B2 8C 78 A8 16   15 E7 D7 66 DF 0A 82 14  .]...x.....f.... 00A0: 09 71 20 7F 82 56 76 69   FC 12 6E B6 8F B2 73 94  .q ..Vvi..n...s. 00B0: C4 D8 FD E5 D5 58 A8 30   3B C4 E9 5B F3 91 10 AA  .....X.0;..[.... 00C0: E6 A1 49 23 51 0F 52 6F   93 C0 B4 9B C1 BB C8 D5  ..I#Q.Ro........ 00D0: 50 C7 19 78 F5 07 F0 9F   87 C6 E1 B2 65 03 ED 93  P..x........e... 00E0: EF D3 D9 F4 EB 02 1D 2D   E5 BB BB B1 84 43 37 E2  .......-.....C7. 00F0: DC 00 BD 54 5B 61 25 A1   AB 44 F5 54 DC 1D 52 53  ...T[a%..D.T..RS 0100: 16 D0 34 2F BD BE B4 4C   A7 8C 1C 2A CB F1 90 C1  ..4/...L...*.... 0110: AD 42 2D CF 8A 43 2E B6   4D 4C 2A B0 2D 0F 5B 5F  .B-..C..ML*.-.[_ 0120: 97 D0 E8 3C 1D C1 2D 90   4E 0F C6 DA 96 9C 9B DF  ...<..-.N....... 0130: 92 FA 82 82 51 78 14 99   B9 D3 7B 6B FC 72 B6 EE  ....Qx.....k.r.. 0140: C1 B4 55 73 68 43 4B F3   0A 6B 96 78 31 3B FC C7  ..UshCK..k.x1;.. 0150: 5D CC 7B 96 F8 AC 84 6C   FA CA 91 9D DA B9 43 44  ]......l......CD 0160: 2F 81 78 1F 66 41 B8 6C   67 16 78 1C CF 1D 63 75  /.x.fA.lg.x...cu 0170: DC 7E 4E 15 DB A9 C0 5D   16 C3 55 A8 B2 B8 7A C3  ..N....]..U...z. 0180: 4A C5 B4 11 33 6F 50 56   8A 94 35 22 7E 7D 92 4D  J...3oPV..5"...M 0190: 2D F9 F8 06 12 41 35 D3   64 9D AA 43 BA C7 22 F5 
-....A5.d..C..". 01A0: 05 EB 32 0E 90 FD B2 0A   E8 EC 6B 06 1A 08 84 87  ..2.......k..... 01B0: 57 6D 40 07 5F 21 B6 E6   0D FC D4 A2 95 FD 0A 36  Wm@._!.........6 01C0: 30 37 76 44 F3 5F 91 75   78 CB 9C 17 6B EE 7F 22  07vD._.ux...k.." 01D0: D2 C5 35 62 13 1E 19 EC   FE 17 2E 44 3D 5C 4E 3D  ..5b.......D=\N= 01E0: 22 6D 49 FC 67 83 F4 64   0E 25 F8 B1 D4 01 94 86  "mI.g..d.%...... 01F0: 9D CC 59 60 6E 1D E2 6D   8C 0D 4A 2E C8 FC 96 65  ..Y`n..m..J....e 0200: 54 D2 B4 81 A7 46 FC FD   76 62 DF 35 FF 57 6D 52  T....F..vb.5.WmR 0210: 80 5A B8 55 CB 9F 30 9C   F7 9A AB F3 F6 03 2C 24  .Z.U..0.......,$ 0220: F3 C4 EB 69 D0 5E BC 88   23 79 B6 AF B4 3E 99 D6  ...i.^..#y...>.. 0230: 23 A0 9E 38 EB 6E 07 DC   73 68 29 B0 BF 31 9C 5B  #..8.n..sh)..1.[ 0240: 98 6A C5 35 D4 BD C3 C9   84 76 57 4E 8D FE D8 B1  .j.5.....vWN.... 0250: 61 CC 6C 21 0D 81 AF FC   9C 25 C9 3B 63 89 AA BA  a.l!.....%.;c... 0260: D2 B4 EE 55 F1 91 D0 11   9C 6C B1 19 D8 F1 AF 5A  ...U.....l.....Z 0270: 61 B0 50 A4 2E 67 3A 70   7B 21 02 5B 01 97 F6 13  a.P..g:p.!.[....

] main, READ: TLSv1 Handshake, length = 331
*** ECDH ServerKeyExchange Server key: SunPKCS11-NSS EC public key, 256 bits (id 1, session object)   public x coord: 108716438294959703938428424752528805236505078799371900849087416902745394709600 public y coord: 57795240448396850305572109632694865628751011045103794660332140731467128933682 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) main, READ: TLSv1 Handshake, length = 4
*** ServerHelloDone
*** ECDHClientKeyExchange ECDH Public value:  { 4, 0, 7, 233, 95, 210, 116, 207, 113, 216, 119, 101, 210, 13, 4, 36, 106, 106, 135, 250, 172, 165, 233, 23, 130, 142, 31, 62, 236, 215, 18, 31, 93, 5, 70, 11, 193, 130, 163, 152, 108, 208, 250, 103, 139, 13, 176, 206, 126, 164, 7, 239, 85, 47, 156, 118, 240, 99, 179, 128, 103, 164, 96, 137, 85 } main, WRITE: TLSv1 Handshake, length = 70 SESSION KEYGEN: PreMaster Secret: 0000: 5F BA 2A 35 33 D4 12 7C   F1 D6 3D 50 64 75 F4 72 
_.*53.....=Pdu.r 0010: 69 ED F1 56 1E 7E 1D 87   48 EF E9 A3 1B 91 56 31  i..V....H.....V1 CONNECTION KEYGEN: Client Nonce: 0000: 57 87 95 61 39 69 2E AE   91 79 19 9A 99 62 2A A7  W..a9i...y...b*. 0010: 08 0C EF 64 BD F1 E3 D5   02 71 7C 44 53 AC 1D 2B  ...d.....q.DS..+ Server Nonce: 0000: AA E6 65 C1 24 D0 7E 2D   87 36 FA 8E 5C C6 24 9C  ..e.$..-.6..\.$. 0010: C0 0B 67 C2 98 C6 A7 67   8F 76 D0 2A 46 F5 B7 3C  ..g....g.v.*F..< Master Secret: 0000: 41 8A E8 BC 20 58 1D AE   3A 3F 12 52 29 CF 6F 12  A... X..:?.R).o. 0010: EA 0B 6B 4E C1 25 18 26   0E 1C C3 F3 A8 76 FD 39  ..kN.%.&.....v.9 0020: 44 52 B4 A0 74 A8 B6 E9   5F 76 1D C4 34 6D 95 E2  DR..t..._v..4m.. Client MAC write Secret: 0000: DF 20 3D 63 00 EE 2B EA   5D 59 94 01 34 C8 3A 90  .
=c..+.]Y..4.:. 0010: B8 3C 2B 2F                                        .<+/ Server MAC write Secret: 0000: 2B 0E 4B AA EC FD 54 EB   40 6C C1 0F 13 54 FD 47  +.K...T.@l...T.G 0010: A1 53 A6 02                     .S.. Client write key: 0000: 26 60 BE EC AB 06 75 E2   02 B4 39 61 35 62 0C 84  &`....u...9a5b.. 0010: 16 CB 80 19 93 79 80 01   B6 6B E9 0C F5 4F BA DB  .....y...k...O.. Server write key: 0000: B6 2C DA 3D 00 44 2A 80   6F 65 47 36 EB A8 D7 40  .,.=.D*.oeG6...@ 0010: 0C CC CD 89 08 A1 7B 85   B4 7B 4E 6D EE 10 5F 9A  ..........Nm.._. Client write IV: 0000: 8B CB FE C2 FA 56 A3 C9   7E E5 FA E9 C8 76 F3 40  .....V.......v.@ Server write IV: 0000: 5A C8 CC E7 91 D9 31 77   1B 10 A3 57 5B D1 CC 9C  Z.....1w...W[... main, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished verify_data:  { 184, 20, 223, 36, 23, 103, 162, 66, 34, 130, 130, 172 }
*** main, WRITE: TLSv1 Handshake, length = 48 main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 48
*** Finished verify_data:  { 11, 150, 72, 24, 35, 222, 227, 77, 59, 153, 109, 157 }
*** %% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] main, WRITE: TLSv1 Application Data, length = 192 main, READ: TLSv1 Application Data, length = 368
密钥库为:./cert/walkiriaapps_dev_cert.p12密钥库类型为:pkcs12密钥库提供程序为:init keyStore init keymanager类型为SunX509
***已找到:[由我隐藏;)]链[0]=[[版本:V3主题:[由我隐藏;)]签名算法:SHA1 WithRSA,OID
=xxxxxx
密钥:Sun RSA公钥,2048位模数:25618728526980407715404586197565746577652430166924543443958286263474289705260309509575851114790157512440017979733186071664686048687095339565618943167521150349144946687953313713970952683535206710086930320078299984880028902160218944719090923289301257990707070707070707070797990707070707070707070707079799070707070707070707079909090907990909090909090838383838383838383838181812579909090909090909090082107833750510476901348232496212394476075431823794118377705804365781896275654639988514944956063978449150517875052084792904320387892912138628992284977428325068149464102067972684138588979563384274470018562651216988102150213581050358800098931234838383838383838383838383838383838383838383838383848487187427272727260293783公众:65537有效性指数:[发件人:2016年7月2日星期六12:29:45 CEST,
收件人:Sun Jul 02 12:29:45 CEST 2017]发行人:[被我隐藏;)]序列号:[02]
证书扩展:4[1]:ObjectId:2.5.29.35严重性=虚假授权密钥标识符[KeyIdentifier[0000:41 73 44 CA 83 7C 81 B0 86 7B B4 0D E9 13 BD 71 AsD………q 0010:38 77 01 2C 8w.,]
[2] :ObjectId:2.5.29.19临界性=真实基本约束:[CA:错误路径:未定义]
[3] :ObjectId:2.5.29.37临界性=错误的扩展密钥用法[clientAuth serverAuth]
[4] :ObjectId:2.5.29.15临界性=真实密钥用法[数字签名密钥\加密数据\加密密钥\协议]
]算法:[SHA1 WithRSA]签名:0000:19 49 F6 4E CD 69 10 5E 3D 97 2C 09 4C 57 2B 65.I.N.I.^=,.LW+e 0010:FD 32 3E B3 80 B0 9B D6 9C 67 F2 BC B4 97 A7.2>…g'…0020:D7 BC 71 B6 3A B6 39 02 94 34 97 32 2E 74 A2 35..q.:.9..4.2.t.5 0030:30 2A 99 4F D0 1B 64 B1 0A 69 18 A8 73 0.*O..d.;I.h.h.18 A6 8 8D8 3BC 7D 5B 07 08 69 Z和a.........................i 0050:6A 32 AC 2B 7A F8 E6 42 07 84 BA A6 E4 F1 AD B6 j2..+Z..B......0060:E5 FB 78 55 97 27 80 ED 49 49 54 E8 D0 E2 96 09...........................IIT....0070:1B 75 D7 4A 53 C5 70 8B CF 76 60 65 9D 1D 39 0E.u.JS p..v'e..0080:32 39 88 7C C4 7B 48 3D C3 FF 73 C5
297 49 F6 AD D3 67 03...-*.GI...g.00E0:E6 DF BA DC 47 38 E1 68 92 1D 52 C8 A0 A7 CE 91...G8.h...R.....00F0:C1 FF 21 59 F1 E9 F6 7B 2D 80 00 02 C7 52 43 08....Y.............RC。
]
***信任库为:./cert/gridserver.keystore信任库类型为:jks信任库提供程序为:init信任库添加为受信任证书:主题:[由我隐藏;)]颁发者:C[由我隐藏;)]算法:RSA;序列号:0x2有效期为2016年6月5日18:14:09 CEST至2021年6月5日18:14:09星期六
触发SecureRandom种子设定完成种子设定SecureRandom忽略不支持的密码套件:TLS_DHE_DSS_WITH_AES_128_CBC_SHA256忽略不支持的密码套件:TLS_DHE_DSS_WITH_AES_256_CBC_SHA256忽略不支持的密码套件:TLS_DHE_RSA_WITH_AES_128_CBC_SHA256忽略不支持的密码套件:TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256ng不受支持的密码套件:TLS_DHE_RSA_WITH_AES_256_CBC_SHA256忽略不受支持的密码套件:TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384忽略不受支持的密码套件:TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384忽略不受支持的密码套件56忽略不支持的密码套件:TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384忽略不支持的密码套件:TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384忽略不支持的密码套件:TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256忽略不支持的密码套件:TLS_ECDH_ECDSA_WITH_WITH_AES_128_CBC_SHA256忽略不支持的密码套件S_128_CBC_SHA256允许不安全的重新协商:false允许遗留hello消息:true是初始握手:true是安全的重新协商:false main,setSoTimeout(0)称为%%无缓存客户端会话
***ClientHello,TLSv1 RandomCookie:GMT:1451660641字节={57,105,46,174,145,121,25,154,153,98,42,167,8,12,239,100,189,241,227,213,2,113,124,68,83,172,29,43}会话ID:{}密码套件:(TLS)我们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一个研究者,他们是一E_ECDSA_与_AES_128_CBC_SHA,TLS_ECDHE_RSA_与_AES_128_CBC_SHA,TLS_RSA_与_AES_128_CBC_SHA,我们的研究结果是一个ECDH和一个ECDH一个ECDH一个ECDH一个ECDH一个用我们的研究128个CBC一个沙,一个用我们的128个CBC一个沙,一个用我们的128个CBC一个沙的便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便的RSA一个用用我们的128个128个便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便便ECDH、ECDSA、CBC、TLS、ECDH、RSA、CBC、SSL压缩方法:{0}扩展椭圆曲线,曲线名称:{secp256r1,secp384r1,secp521r1}扩展ec点格式,格式:[未压缩]扩展服务器名称,服务器名称:[主机名称: