ACTION: build -- Passed. Build successful REASON: User specified action: run build jtreg.SkippedException ValidatePathWithURL CAInterop TIME: 0.774 seconds messages: command: build jtreg.SkippedException ValidatePathWithURL CAInterop reason: User specified action: run build jtreg.SkippedException ValidatePathWithURL CAInterop started: Thu May 16 19:37:30 CST 2024 Test directory: compile: ValidatePathWithURL, CAInterop finished: Thu May 16 19:37:30 CST 2024 elapsed time (seconds): 0.774 ACTION: compile -- Passed. Compilation successful REASON: .class file out of date or does not exist TIME: 0.773 seconds messages: command: compile /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java reason: .class file out of date or does not exist started: Thu May 16 19:37:30 CST 2024 Mode: othervm finished: Thu May 16 19:37:30 CST 2024 elapsed time (seconds): 0.773 configuration: javac compilation environment source path: /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification /var/tmp/tone/run/jtreg/jdk-repo/test/lib class path: /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification /var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d /var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/test/lib rerun: cd /var/tmp/tone/run/jtreg/jt-work/test_jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46 && \ DISPLAY=:7 \ HOME=/home/testUserForTone \ JTREG_VERSION=jtreg-7.3.1.1 \ LANG=C \ LC_CTYPE=C.UTF-8 \ LD_LIBRARY_PATH= \ PATH=/bin:/usr/bin:/usr/sbin \ TEST_IMAGE_DIR=/var/tmp/tone/run/jtreg/test-images \ /var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk/bin/javac \ -J-Djdk.lang.processReaperUseDefaultStackSize=true \ -J-Dtest.wisp.socketAddress=www.alibabacloud.com \ -J-Xmixed \ -J-ea \ -J-esa \ -J-Dtest.vm.opts='-Djdk.lang.processReaperUseDefaultStackSize=true -Dtest.wisp.socketAddress=www.alibabacloud.com -Xmixed -ea -esa' \ -J-Dtest.tool.vm.opts='-J-Djdk.lang.processReaperUseDefaultStackSize=true -J-Dtest.wisp.socketAddress=www.alibabacloud.com -J-Xmixed -J-ea -J-esa' \ -J-Dtest.compiler.opts= \ -J-Dtest.java.opts= \ -J-Dtest.jdk=/var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk \ -J-Dcompile.jdk=/var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk \ -J-Dtest.timeout.factor=4.0 \ -J-Dtest.nativepath=/var/tmp/tone/run/jtreg/test-images/hotspot/jtreg/native \ -J-Dtest.root=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk \ -J-Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -J-Dtest.file=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -J-Dtest.src=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -J-Dtest.src.path=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/var/tmp/tone/run/jtreg/jdk-repo/test/lib \ -J-Dtest.classes=/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -J-Dtest.class.path=/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/test/lib \ -d /var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -sourcepath /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/var/tmp/tone/run/jtreg/jdk-repo/test/lib \ -classpath /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/test/lib /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java STDOUT: STDERR: Note: /var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java uses or overrides a deprecated API. Note: Recompile with -Xlint:deprecation for details. ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.0 seconds messages: command: build CAInterop reason: Named class compiled on demand started: Thu May 16 19:37:30 CST 2024 finished: Thu May 16 19:37:30 CST 2024 elapsed time (seconds): 0.0 ACTION: main -- Passed. Execution successful REASON: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP TIME: 4.841 seconds messages: command: main -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP reason: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP started: Thu May 16 19:37:30 CST 2024 Mode: othervm [/othervm specified] finished: Thu May 16 19:37:35 CST 2024 elapsed time (seconds): 4.841 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== http.proxyHost :null http.proxyPort :null https.proxyHost :null https.proxyPort :null https.socksProxyHost :null https.socksProxyPort :null jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01 com.sun.security.enableCRLDP :false ocsp.enable :true ===================================================== ===== Validate https://valid.e46.roots.globalsign.com===== Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS ===== Validate https://revoked.e46.roots.globalsign.com===== SSLHandshakeException: (certificate_revoked) PKIX path validation failed: java.security.cert.CertPathValidatorException: Certificate has been revoked, reason: UNSPECIFIED, revocation date: Mon Oct 23 20:29:02 CST 2023, authority: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE, extension OIDs: [] Certificate is revoked Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS STDERR: certpath: Constraints: 3DES_EDE_CBC certpath: Constraints: anon certpath: Constraints: DES certpath: Constraints: DH keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DTLSv1.0 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: ECDH certpath: Constraints: MD5withRSA certpath: Constraints: NULL certpath: Constraints: RC4 certpath: Constraints: SSLv3 certpath: Constraints: TLSv1 certpath: Constraints: TLSv1.1 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Thu May 16 19:37:32 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Thu May 16 19:37:32 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:32 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: com.sun.security.ocsp.timeout set to 15000 milliseconds certpath: com.sun.security.ocsp.readtimeout set to 15000 milliseconds certpath: com.sun.security.ocsp.useget set to true certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 32 5A 30 73 0240516113202Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 36 31 31 33 32 30 32 5A .20240516113202Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 30 31 31 33 32 ....202405201132 00C0: 30 31 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 01Z0...*.H...... 00D0: 05 00 03 82 01 01 00 60 6F CF 47 CE F3 84 E1 2D .......`o.G....- 00E0: 56 56 CD D2 E4 DF A7 8F D8 2A 53 35 12 B4 AB 65 VV.......*S5...e 00F0: 0D 5F 36 8F CF 58 2E AC B9 0A 39 7F 96 AC CA 48 ._6..X....9....H 0100: 04 F7 20 28 19 A4 8E BB 1E 79 41 88 FF 02 2C F5 .. (.....yA...,. 0110: BE 93 4D 0F 7D 5A A4 67 10 46 AF 29 A7 9D 03 D2 ..M..Z.g.F.).... 0120: 90 E7 AF BC 7E E3 2A 2E 5D 53 B8 E0 68 AE E3 B4 ......*.]S..h... 0130: 87 D4 41 D6 B3 F5 70 6C C9 E9 0E 60 E8 D3 57 77 ..A...pl...`..Ww 0140: 97 BA DB F1 14 0C 08 05 07 9F 09 9D 1A F8 11 D8 ................ 0150: 13 E3 94 8F 8D 46 5A 17 AC A4 A5 F3 59 F6 1D EA .....FZ.....Y... 0160: 15 22 28 39 AB 5A 00 74 9A C0 66 E2 1E 63 7A CE ."(9.Z.t..f..cz. 0170: 24 51 34 1D 7C D8 C4 3B 2D 3A B7 91 2F 9C D3 A6 $Q4....;-:../... 0180: FC 00 37 60 54 AE 29 FC 5B CA A3 66 1F 3E 73 4B ..7`T.).[..f.>sK 0190: A2 3E 07 E3 A5 BE 18 34 C0 03 99 2F 52 7D 02 0E .>.....4.../R... 01A0: 5C A1 38 E2 80 8A B3 80 D8 8B 76 A2 13 C1 4A 1F \.8.......v...J. 01B0: 46 77 A0 48 6A 82 20 66 74 4E FA F0 EF 7A 36 1C Fw.Hj. ftN...z6. 01C0: 04 6D 51 3F 03 4B F8 49 29 3B 11 B2 F4 80 D5 93 .mQ?.K.I);...... 01D0: BF E0 93 83 4C 8D C1 A0 82 03 1A 30 82 03 16 30 ....L......0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Thu May 16 19:32:02 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Thu May 16 19:32:02 CST 2024 certpath: nextUpdate: Mon May 20 19:32:01 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Thu May 16 19:32:02 CST 2024 until Mon May 20 19:32:01 CST 2024 certpath: Checking validity of OCSP response on Thu May 16 19:37:32 CST 2024 with allowed interval between Thu May 16 19:22:32 CST 2024 and Thu May 16 19:52:32 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Thu May 16 19:37:32 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:32 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 C7 71 FD DA A6 99 85 E4 B6 61 75 F2 `....q.......au. 0050: 65 C5 8A certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 8A 0A 01 00 A0 82 03 83 30 82 03 7F 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 70 30 82 .+.....0.....p0. 0020: 03 6C 30 81 9E A2 16 04 14 19 17 98 FD 8F 82 B1 .l0............. 0030: B5 A3 BC 80 FD B1 D5 E3 49 B0 01 8A 35 18 0F 32 ........I...5..2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 30 5A 30 73 0240516113200Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 16 FA .........d.s.T.. 0070: EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF 0D 79 ...j...^.......y 0080: A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 C7 71 .Oi!.Aq.Se`....q 0090: FD DA A6 99 85 E4 B6 61 75 F2 65 C5 8A 80 00 18 .......au.e..... 00A0: 0F 32 30 32 34 30 35 31 36 31 31 30 30 30 30 5A .20240516110000Z 00B0: A0 11 18 0F 32 30 32 34 30 35 31 36 32 33 30 30 ....202405162300 00C0: 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 00Z0...*.H.=.... 00D0: 47 00 30 44 02 20 35 6C AD DA 06 CE 3E 9F F5 A2 G.0D. 5l....>... 00E0: 62 11 4A C0 FC E8 FA 97 16 7D 01 EA B4 13 40 EC b.J...........@. 00F0: FC 86 ED B4 F4 1D 02 20 5C BD AA CA F5 48 72 0E ....... \....Hr. 0100: 71 2C F2 A0 4F AE 5B F1 CF FF A4 75 E6 63 E6 40 q,..O.[....u.c.@ 0110: 79 D8 F7 CF 64 49 BF 43 A0 82 02 72 30 82 02 6E y...dI.C...r0..n 0120: 30 82 02 6A 30 82 01 EF A0 03 02 01 02 02 10 01 0..j0........... 0130: 94 5C 40 3E 17 DB 37 06 5B 4B B3 22 A0 A7 38 30 .\@>..7.[K."..80 0140: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 59 31 0B 30 ...*.H.=...0Y1.0 0150: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0160: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0170: 6E 76 2D 73 61 31 2F 30 2D 06 03 55 04 03 13 26 nv-sa1/0-..U...& 0180: 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 GlobalSign Atlas 0190: 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 20 32 E46 EV TLS CA 2 01A0: 30 32 33 20 51 34 30 1E 17 0D 32 34 30 35 31 33 023 Q40...240513 01B0: 30 35 32 35 33 36 5A 17 0D 32 34 30 35 32 30 30 052536Z..2405200 01C0: 35 32 35 33 36 5A 30 6A 31 0B 30 09 06 03 55 04 52536Z0j1.0...U. 01D0: 06 13 02 42 45 31 19 30 17 06 03 55 04 0A 0C 10 ...BE1.0...U.... 01E0: 47 6C 6F 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 GlobalSign nv-sa 01F0: 31 40 30 3E 06 03 55 04 03 0C 37 47 6C 6F 62 61 1@0>..U...7Globa 0200: 6C 53 69 67 6E 20 41 74 6C 61 73 20 45 34 36 20 lSign Atlas E46 0210: 45 56 20 54 4C 53 20 43 41 20 32 30 32 33 20 51 EV TLS CA 2023 Q 0220: 34 20 2D 20 4F 43 53 50 20 52 65 73 70 6F 6E 64 4 - OCSP Respond 0230: 65 72 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 er0Y0...*.H.=... 0240: 08 2A 86 48 CE 3D 03 01 07 03 42 00 04 31 BA 4B .*.H.=....B..1.K 0250: FF 30 16 B0 F8 E8 EA D9 50 64 FF DA EA 7E 84 88 .0......Pd...... 0260: 15 CE B7 31 60 07 08 D8 C2 D4 65 5E B2 59 B0 72 ...1`.....e^.Y.r 0270: E8 E1 20 F0 6A 6A 36 B9 B2 82 F7 F9 E6 65 54 31 .. .jj6......eT1 0280: A8 7F 86 6A 75 6B 1B 7D 33 06 4C 64 40 A3 81 87 ...juk..3.Ld@... 0290: 30 81 84 30 0F 06 09 2B 06 01 05 05 07 30 01 05 0..0...+.....0.. 02A0: 04 02 05 00 30 0E 06 03 55 1D 0F 01 01 FF 04 04 ....0...U....... 02B0: 03 02 07 80 30 13 06 03 55 1D 25 04 0C 30 0A 06 ....0...U.%..0.. 02C0: 08 2B 06 01 05 05 07 03 09 30 1D 06 03 55 1D 0E .+.......0...U.. 02D0: 04 16 04 14 19 17 98 FD 8F 82 B1 B5 A3 BC 80 FD ................ 02E0: B1 D5 E3 49 B0 01 8A 35 30 0C 06 03 55 1D 13 01 ...I...50...U... 02F0: 01 FF 04 02 30 00 30 1F 06 03 55 1D 23 04 18 30 ....0.0...U.#..0 0300: 16 80 14 5E C4 F2 F2 F8 D0 CF 0D 79 A3 4F 69 21 ...^.......y.Oi! 0310: F1 41 71 7D 53 65 60 30 0A 06 08 2A 86 48 CE 3D .Aq.Se`0...*.H.= 0320: 04 03 03 03 69 00 30 66 02 31 00 8E 1D 2F 57 8D ....i.0f.1.../W. 0330: A6 2D 10 EB 88 51 D7 B0 A2 EE 72 3A 2C BD 7D 16 .-...Q....r:,... 0340: 9E F2 2A 51 6F DA CB AA 15 40 EC 97 41 E7 5E 82 ..*Qo....@..A.^. 0350: CD 2B 5E 08 15 92 CD 80 F8 60 E9 02 31 00 80 E5 .+^......`..1... 0360: C4 7E A3 5D DE D4 50 6A 37 F2 F0 CA 44 51 45 AF ...]..Pj7...DQE. 0370: 4A D1 DE 0B 57 BC 95 01 2A A8 AF 1C 53 EA B1 4B J...W...*...S..K 0380: 8D D0 C7 5A 63 16 91 D9 D9 D9 34 C5 61 AB certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 191798FD8F82B1B5A3BC80FDB1D5E349B0018A35 certpath: OCSP response produced at: Thu May 16 19:32:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Thu May 16 19:00:00 CST 2024 certpath: nextUpdate: Fri May 17 07:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Thu May 16 19:00:00 CST 2024 until Fri May 17 07:00:00 CST 2024 certpath: Checking validity of OCSP response on Thu May 16 19:37:32 CST 2024 with allowed interval between Thu May 16 19:22:32 CST 2024 and Thu May 16 19:52:32 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert2 validation succeeded. certpath: Cert path validation succeeded. (PKIX validation algorithm) certpath: -------------------------------------------------------------- certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Thu May 16 19:37:35 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Thu May 16 19:37:35 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:35 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 32 5A 30 73 0240516113202Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 36 31 31 33 32 30 32 5A .20240516113202Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 30 31 31 33 32 ....202405201132 00C0: 30 31 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 01Z0...*.H...... 00D0: 05 00 03 82 01 01 00 60 6F CF 47 CE F3 84 E1 2D .......`o.G....- 00E0: 56 56 CD D2 E4 DF A7 8F D8 2A 53 35 12 B4 AB 65 VV.......*S5...e 00F0: 0D 5F 36 8F CF 58 2E AC B9 0A 39 7F 96 AC CA 48 ._6..X....9....H 0100: 04 F7 20 28 19 A4 8E BB 1E 79 41 88 FF 02 2C F5 .. (.....yA...,. 0110: BE 93 4D 0F 7D 5A A4 67 10 46 AF 29 A7 9D 03 D2 ..M..Z.g.F.).... 0120: 90 E7 AF BC 7E E3 2A 2E 5D 53 B8 E0 68 AE E3 B4 ......*.]S..h... 0130: 87 D4 41 D6 B3 F5 70 6C C9 E9 0E 60 E8 D3 57 77 ..A...pl...`..Ww 0140: 97 BA DB F1 14 0C 08 05 07 9F 09 9D 1A F8 11 D8 ................ 0150: 13 E3 94 8F 8D 46 5A 17 AC A4 A5 F3 59 F6 1D EA .....FZ.....Y... 0160: 15 22 28 39 AB 5A 00 74 9A C0 66 E2 1E 63 7A CE ."(9.Z.t..f..cz. 0170: 24 51 34 1D 7C D8 C4 3B 2D 3A B7 91 2F 9C D3 A6 $Q4....;-:../... 0180: FC 00 37 60 54 AE 29 FC 5B CA A3 66 1F 3E 73 4B ..7`T.).[..f.>sK 0190: A2 3E 07 E3 A5 BE 18 34 C0 03 99 2F 52 7D 02 0E .>.....4.../R... 01A0: 5C A1 38 E2 80 8A B3 80 D8 8B 76 A2 13 C1 4A 1F \.8.......v...J. 01B0: 46 77 A0 48 6A 82 20 66 74 4E FA F0 EF 7A 36 1C Fw.Hj. ftN...z6. 01C0: 04 6D 51 3F 03 4B F8 49 29 3B 11 B2 F4 80 D5 93 .mQ?.K.I);...... 01D0: BF E0 93 83 4C 8D C1 A0 82 03 1A 30 82 03 16 30 ....L......0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Thu May 16 19:32:02 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Thu May 16 19:32:02 CST 2024 certpath: nextUpdate: Mon May 20 19:32:01 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Thu May 16 19:32:02 CST 2024 until Mon May 20 19:32:01 CST 2024 certpath: Checking validity of OCSP response on Thu May 16 19:37:35 CST 2024 with allowed interval between Thu May 16 19:22:35 CST 2024 and Thu May 16 19:52:35 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Thu May 16 19:37:35 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:35 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 `....'u.T....... 0050: C7 3A 20 certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 9E 0A 01 00 A0 82 03 97 30 82 03 93 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 84 30 82 .+.....0......0. 0020: 03 80 30 81 B1 A2 16 04 14 22 64 63 1C CB ED 08 ..0......"dc.... 0030: 9C 92 F2 F0 78 E4 74 18 E2 32 AC 83 70 18 0F 32 ....x.t..2..p..2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 30 5A 30 81 0240516113200Z0. 0050: 85 30 81 82 30 49 30 09 06 05 2B 0E 03 02 1A 05 .0..0I0...+..... 0060: 00 04 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 ...........d.s.T 0070: 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF .....j...^...... 0080: 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 .y.Oi!.Aq.Se`... 0090: E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 C7 3A 20 A1 .'u.T........: . 00A0: 11 18 0F 32 30 32 33 31 30 32 33 31 32 32 39 30 ...2023102312290 00B0: 32 5A 18 0F 32 30 32 34 30 35 31 36 31 31 30 30 2Z..202405161100 00C0: 30 30 5A A0 11 18 0F 32 30 32 34 30 35 31 36 32 00Z....202405162 00D0: 33 30 30 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 30000Z0...*.H.=. 00E0: 03 02 03 48 00 30 45 02 21 00 85 AD 4F 95 16 CD ...H.0E.!...O... 00F0: 18 D1 4F 31 13 26 B0 5D 70 C1 84 71 98 B2 13 19 ..O1.&.]p..q.... 0100: A5 3E 25 6F 1B 59 A8 7A 15 30 02 20 4B AF AB 52 .>%o.Y.z.0. K..R 0110: 2A BA 4C 24 E2 0B 08 DF 23 A6 03 54 4E D5 E3 ED *.L$....#..TN... 0120: 07 10 85 11 AA D9 EB 57 7A B7 4E 74 A0 82 02 72 .......Wz.Nt...r 0130: 30 82 02 6E 30 82 02 6A 30 82 01 EF A0 03 02 01 0..n0..j0....... 0140: 02 02 10 01 13 93 E7 B8 A9 E7 FC 98 12 BA 03 99 ................ 0150: 39 66 05 30 0A 06 08 2A 86 48 CE 3D 04 03 03 30 9f.0...*.H.=...0 0160: 59 31 0B 30 09 06 03 55 04 06 13 02 42 45 31 19 Y1.0...U....BE1. 0170: 30 17 06 03 55 04 0A 13 10 47 6C 6F 62 61 6C 53 0...U....GlobalS 0180: 69 67 6E 20 6E 76 2D 73 61 31 2F 30 2D 06 03 55 ign nv-sa1/0-..U 0190: 04 03 13 26 47 6C 6F 62 61 6C 53 69 67 6E 20 41 ...&GlobalSign A 01A0: 74 6C 61 73 20 45 34 36 20 45 56 20 54 4C 53 20 tlas E46 EV TLS 01B0: 43 41 20 32 30 32 33 20 51 34 30 1E 17 0D 32 34 CA 2023 Q40...24 01C0: 30 35 31 32 31 32 32 31 35 35 5A 17 0D 32 34 30 0512122155Z..240 01D0: 35 31 39 31 32 32 31 35 35 5A 30 6A 31 0B 30 09 519122155Z0j1.0. 01E0: 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 55 ..U....BE1.0...U 01F0: 04 0A 0C 10 47 6C 6F 62 61 6C 53 69 67 6E 20 6E ....GlobalSign n 0200: 76 2D 73 61 31 40 30 3E 06 03 55 04 03 0C 37 47 v-sa1@0>..U...7G 0210: 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 20 lobalSign Atlas 0220: 45 34 36 20 45 56 20 54 4C 53 20 43 41 20 32 30 E46 EV TLS CA 20 0230: 32 33 20 51 34 20 2D 20 4F 43 53 50 20 52 65 73 23 Q4 - OCSP Res 0240: 70 6F 6E 64 65 72 30 59 30 13 06 07 2A 86 48 CE ponder0Y0...*.H. 0250: 3D 02 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 00 =....*.H.=....B. 0260: 04 35 ED A0 5F EE DF 56 1E 04 96 E7 18 A6 5F 76 .5.._..V......_v 0270: 5B 07 E1 0B 50 A9 C4 05 C8 03 DB C3 C4 4D D3 E2 [...P........M.. 0280: D3 1A 24 61 CF 62 D4 26 9B 9D 7A 11 1C C1 36 D9 ..$a.b.&..z...6. 0290: FD 28 7A A7 48 10 F6 EF A8 8C DA 0D 2D B6 27 4C .(z.H.......-.'L 02A0: 01 A3 81 87 30 81 84 30 0F 06 09 2B 06 01 05 05 ....0..0...+.... 02B0: 07 30 01 05 04 02 05 00 30 0E 06 03 55 1D 0F 01 .0......0...U... 02C0: 01 FF 04 04 03 02 07 80 30 13 06 03 55 1D 25 04 ........0...U.%. 02D0: 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 30 1D 06 .0...+.......0.. 02E0: 03 55 1D 0E 04 16 04 14 22 64 63 1C CB ED 08 9C .U......"dc..... 02F0: 92 F2 F0 78 E4 74 18 E2 32 AC 83 70 30 0C 06 03 ...x.t..2..p0... 0300: 55 1D 13 01 01 FF 04 02 30 00 30 1F 06 03 55 1D U.......0.0...U. 0310: 23 04 18 30 16 80 14 5E C4 F2 F2 F8 D0 CF 0D 79 #..0...^.......y 0320: A3 4F 69 21 F1 41 71 7D 53 65 60 30 0A 06 08 2A .Oi!.Aq.Se`0...* 0330: 86 48 CE 3D 04 03 03 03 69 00 30 66 02 31 00 D9 .H.=....i.0f.1.. 0340: 82 16 FA A7 3F 8D 05 84 BF EC FE 9A 7A E1 4C 9D ....?.......z.L. 0350: 8D F1 5F 8A 19 4F 3C 46 51 4F 72 06 BE 06 84 12 .._..O (a java.lang.Thread) at java.lang.Object.wait(java.base@23/Object.java:374) at java.lang.Thread.join(java.base@23/Thread.java:2017) - locked <0x0000000473889e58> (a java.lang.Thread) at java.lang.Thread.join(java.base@23/Thread.java:2093) at com.sun.javatest.regtest.agent.MainWrapper.main(MainWrapper.java:85) "Reference Handler" #9 [2854452] daemon prio=10 os_prio=0 cpu=0.17ms elapsed=480.18s tid=0x00007fd240182410 nid=2854452 waiting on condition [0x00007fd204f18000] java.lang.Thread.State: RUNNABLE at java.lang.ref.Reference.waitForReferencePendingList(java.base@23/Native Method) at java.lang.ref.Reference.processPendingReferences(java.base@23/Reference.java:246) at java.lang.ref.Reference$ReferenceHandler.run(java.base@23/Reference.java:208) "Finalizer" #10 [2854453] daemon prio=8 os_prio=0 cpu=0.10ms elapsed=480.18s tid=0x00007fd240183a60 nid=2854453 in Object.wait() [0x00007fd204e17000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait0(java.base@23/Native Method) - waiting on <0x0000000473801590> (a java.lang.ref.NativeReferenceQueue$Lock) at java.lang.Object.wait(java.base@23/Object.java:374) at java.lang.Object.wait(java.base@23/Object.java:348) at java.lang.ref.NativeReferenceQueue.await(java.base@23/NativeReferenceQueue.java:48) at java.lang.ref.ReferenceQueue.remove0(java.base@23/ReferenceQueue.java:158) at java.lang.ref.NativeReferenceQueue.remove(java.base@23/NativeReferenceQueue.java:89) - locked <0x0000000473801590> (a java.lang.ref.NativeReferenceQueue$Lock) at java.lang.ref.Finalizer$FinalizerThread.run(java.base@23/Finalizer.java:173) "Signal Dispatcher" #11 [2854454] daemon prio=9 os_prio=0 cpu=0.19ms elapsed=480.18s tid=0x00007fd2401856f0 nid=2854454 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Service Thread" #12 [2854455] daemon prio=9 os_prio=0 cpu=5.33ms elapsed=480.18s tid=0x00007fd240186d30 nid=2854455 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Monitor Deflation Thread" #13 [2854456] daemon prio=9 os_prio=0 cpu=18.47ms elapsed=480.18s tid=0x00007fd2401882d0 nid=2854456 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "C2 CompilerThread0" #14 [2854457] daemon prio=9 os_prio=0 cpu=246.44ms elapsed=480.18s tid=0x00007fd240189dd0 nid=2854457 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "C1 CompilerThread0" #24 [2854458] daemon prio=9 os_prio=0 cpu=82.45ms elapsed=480.18s tid=0x00007fd24018b4e0 nid=2854458 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "Notification Thread" #29 [2854459] daemon prio=9 os_prio=0 cpu=0.04ms elapsed=480.18s tid=0x00007fd24019a140 nid=2854459 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Common-Cleaner" #30 [2854460] daemon prio=8 os_prio=0 cpu=0.83ms elapsed=480.18s tid=0x00007fd2401a6650 nid=2854460 waiting on condition [0x00007fd20463f000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@23/Native Method) - parking to wait for <0x00000004738159c8> (a java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@23/LockSupport.java:269) at java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(java.base@23/AbstractQueuedSynchronizer.java:1852) at java.lang.ref.ReferenceQueue.await(java.base@23/ReferenceQueue.java:71) at java.lang.ref.ReferenceQueue.remove0(java.base@23/ReferenceQueue.java:143) at java.lang.ref.ReferenceQueue.remove(java.base@23/ReferenceQueue.java:218) at jdk.internal.ref.CleanerImpl.run(java.base@23/CleanerImpl.java:140) at java.lang.Thread.runWith(java.base@23/Thread.java:1588) at java.lang.Thread.run(java.base@23/Thread.java:1575) at jdk.internal.misc.InnocuousThread.run(java.base@23/InnocuousThread.java:186) "MainThread" #31 [2854464] prio=5 os_prio=0 cpu=371.15ms elapsed=480.16s tid=0x00007fd2401e58c0 nid=2854464 runnable [0x00007fd204230000] java.lang.Thread.State: RUNNABLE at sun.nio.ch.SocketDispatcher.read0(java.base@23/Native Method) at sun.nio.ch.SocketDispatcher.read(java.base@23/SocketDispatcher.java:47) at sun.nio.ch.NioSocketImpl.tryRead(java.base@23/NioSocketImpl.java:256) at sun.nio.ch.NioSocketImpl.implRead(java.base@23/NioSocketImpl.java:307) at sun.nio.ch.NioSocketImpl.read(java.base@23/NioSocketImpl.java:346) at sun.nio.ch.NioSocketImpl$1.read(java.base@23/NioSocketImpl.java:796) at java.net.Socket$SocketInputStream.implRead(java.base@23/Socket.java:1116) at java.net.Socket$SocketInputStream.read(java.base@23/Socket.java:1103) at sun.security.ssl.SSLSocketInputRecord.read(java.base@23/SSLSocketInputRecord.java:489) at sun.security.ssl.SSLSocketInputRecord.readFully(java.base@23/SSLSocketInputRecord.java:472) at sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(java.base@23/SSLSocketInputRecord.java:243) at sun.security.ssl.SSLSocketInputRecord.decode(java.base@23/SSLSocketInputRecord.java:181) at sun.security.ssl.SSLTransport.decode(java.base@23/SSLTransport.java:111) at sun.security.ssl.SSLSocketImpl.decode(java.base@23/SSLSocketImpl.java:1507) at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(java.base@23/SSLSocketImpl.java:1422) at sun.security.ssl.SSLSocketImpl.startHandshake(java.base@23/SSLSocketImpl.java:455) at sun.security.ssl.SSLSocketImpl.startHandshake(java.base@23/SSLSocketImpl.java:426) at sun.net.www.protocol.https.HttpsClient.afterConnect(java.base@23/HttpsClient.java:586) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(java.base@23/AbstractDelegateHttpsURLConnection.java:187) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(java.base@23/HttpsURLConnectionImpl.java:141) at ValidatePathWithURL.validateDomainCertChain(ValidatePathWithURL.java:142) at ValidatePathWithURL.validateDomain(ValidatePathWithURL.java:128) at CAInterop.validate(CAInterop.java:788) at CAInterop.main(CAInterop.java:726) at java.lang.invoke.LambdaForm$DMH/0x00007fd1b7002000.invokeStatic(java.base@23/LambdaForm$DMH) at java.lang.invoke.LambdaForm$MH/0x00007fd1b7003400.invoke(java.base@23/LambdaForm$MH) at java.lang.invoke.Invokers$Holder.invokeExact_MT(java.base@23/Invokers$Holder) at jdk.internal.reflect.DirectMethodHandleAccessor.invokeImpl(java.base@23/DirectMethodHandleAccessor.java:154) at jdk.internal.reflect.DirectMethodHandleAccessor.invoke(java.base@23/DirectMethodHandleAccessor.java:103) at java.lang.reflect.Method.invoke(java.base@23/Method.java:580) at com.sun.javatest.regtest.agent.MainWrapper$MainTask.run(MainWrapper.java:138) at java.lang.Thread.runWith(java.base@23/Thread.java:1588) at java.lang.Thread.run(java.base@23/Thread.java:1575) "Attach Listener" #34 [3102742] daemon prio=9 os_prio=0 cpu=0.12ms elapsed=0.10s tid=0x00007fd194000f40 nid=3102742 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "VM Thread" os_prio=0 cpu=0.54ms elapsed=480.19s tid=0x00007fd240174a50 nid=2854451 runnable "VM Periodic Task Thread" os_prio=0 cpu=110.58ms elapsed=480.19s tid=0x00007fd240159bf0 nid=2854450 waiting on condition "G1 Service" os_prio=0 cpu=7.82ms elapsed=480.20s tid=0x00007fd2401408b0 nid=2854449 runnable "G1 Refine#0" os_prio=0 cpu=0.04ms elapsed=480.20s tid=0x00007fd24013f8f0 nid=2854448 runnable "G1 Conc#0" os_prio=0 cpu=0.03ms elapsed=480.20s tid=0x00007fd24006e580 nid=2854447 runnable "G1 Main Marker" os_prio=0 cpu=0.04ms elapsed=480.20s tid=0x00007fd24006d5a0 nid=2854446 runnable "GC Thread#0" os_prio=0 cpu=0.04ms elapsed=480.20s tid=0x00007fd240058fe0 nid=2854445 runnable JNI global refs: 27, weak refs: 0 --- Timeout information end. finished: Thu May 16 19:45:35 CST 2024 elapsed time (seconds): 480.209 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== http.proxyHost :null http.proxyPort :null https.proxyHost :null https.proxyPort :null https.socksProxyHost :null https.socksProxyPort :null jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01 com.sun.security.enableCRLDP :false ocsp.enable :true ===================================================== ===== Validate https://valid.e46.roots.globalsign.com===== Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS ===== Validate https://revoked.e46.roots.globalsign.com===== Timeout signalled after 480 seconds STDERR: certpath: Constraints: 3DES_EDE_CBC certpath: Constraints: anon certpath: Constraints: DES certpath: Constraints: DH keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DTLSv1.0 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: ECDH certpath: Constraints: MD5withRSA certpath: Constraints: NULL certpath: Constraints: RC4 certpath: Constraints: SSLv3 certpath: Constraints: TLSv1 certpath: Constraints: TLSv1.1 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Thu May 16 19:37:37 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Thu May 16 19:37:37 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:37 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: com.sun.security.ocsp.timeout set to 15000 milliseconds certpath: com.sun.security.ocsp.readtimeout set to 15000 milliseconds certpath: com.sun.security.ocsp.useget set to false certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 32 5A 30 73 0240516113202Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 36 31 31 33 32 30 32 5A .20240516113202Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 30 31 31 33 32 ....202405201132 00C0: 30 31 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 01Z0...*.H...... 00D0: 05 00 03 82 01 01 00 60 6F CF 47 CE F3 84 E1 2D .......`o.G....- 00E0: 56 56 CD D2 E4 DF A7 8F D8 2A 53 35 12 B4 AB 65 VV.......*S5...e 00F0: 0D 5F 36 8F CF 58 2E AC B9 0A 39 7F 96 AC CA 48 ._6..X....9....H 0100: 04 F7 20 28 19 A4 8E BB 1E 79 41 88 FF 02 2C F5 .. (.....yA...,. 0110: BE 93 4D 0F 7D 5A A4 67 10 46 AF 29 A7 9D 03 D2 ..M..Z.g.F.).... 0120: 90 E7 AF BC 7E E3 2A 2E 5D 53 B8 E0 68 AE E3 B4 ......*.]S..h... 0130: 87 D4 41 D6 B3 F5 70 6C C9 E9 0E 60 E8 D3 57 77 ..A...pl...`..Ww 0140: 97 BA DB F1 14 0C 08 05 07 9F 09 9D 1A F8 11 D8 ................ 0150: 13 E3 94 8F 8D 46 5A 17 AC A4 A5 F3 59 F6 1D EA .....FZ.....Y... 0160: 15 22 28 39 AB 5A 00 74 9A C0 66 E2 1E 63 7A CE ."(9.Z.t..f..cz. 0170: 24 51 34 1D 7C D8 C4 3B 2D 3A B7 91 2F 9C D3 A6 $Q4....;-:../... 0180: FC 00 37 60 54 AE 29 FC 5B CA A3 66 1F 3E 73 4B ..7`T.).[..f.>sK 0190: A2 3E 07 E3 A5 BE 18 34 C0 03 99 2F 52 7D 02 0E .>.....4.../R... 01A0: 5C A1 38 E2 80 8A B3 80 D8 8B 76 A2 13 C1 4A 1F \.8.......v...J. 01B0: 46 77 A0 48 6A 82 20 66 74 4E FA F0 EF 7A 36 1C Fw.Hj. ftN...z6. 01C0: 04 6D 51 3F 03 4B F8 49 29 3B 11 B2 F4 80 D5 93 .mQ?.K.I);...... 01D0: BF E0 93 83 4C 8D C1 A0 82 03 1A 30 82 03 16 30 ....L......0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Thu May 16 19:32:02 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Thu May 16 19:32:02 CST 2024 certpath: nextUpdate: Mon May 20 19:32:01 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Thu May 16 19:32:02 CST 2024 until Mon May 20 19:32:01 CST 2024 certpath: Checking validity of OCSP response on Thu May 16 19:37:37 CST 2024 with allowed interval between Thu May 16 19:22:37 CST 2024 and Thu May 16 19:52:37 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Thu May 16 19:37:37 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu May 16 19:37:37 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 C7 71 FD DA A6 99 85 E4 B6 61 75 F2 `....q.......au. 0050: 65 C5 8A certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 8A 0A 01 00 A0 82 03 83 30 82 03 7F 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 70 30 82 .+.....0.....p0. 0020: 03 6C 30 81 9E A2 16 04 14 19 17 98 FD 8F 82 B1 .l0............. 0030: B5 A3 BC 80 FD B1 D5 E3 49 B0 01 8A 35 18 0F 32 ........I...5..2 0040: 30 32 34 30 35 31 36 31 31 33 32 30 30 5A 30 73 0240516113200Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 16 FA .........d.s.T.. 0070: EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF 0D 79 ...j...^.......y 0080: A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 C7 71 .Oi!.Aq.Se`....q 0090: FD DA A6 99 85 E4 B6 61 75 F2 65 C5 8A 80 00 18 .......au.e..... 00A0: 0F 32 30 32 34 30 35 31 36 31 31 30 30 30 30 5A .20240516110000Z 00B0: A0 11 18 0F 32 30 32 34 30 35 31 36 32 33 30 30 ....202405162300 00C0: 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 00Z0...*.H.=.... 00D0: 47 00 30 44 02 20 35 6C AD DA 06 CE 3E 9F F5 A2 G.0D. 5l....>... 00E0: 62 11 4A C0 FC E8 FA 97 16 7D 01 EA B4 13 40 EC b.J...........@. 00F0: FC 86 ED B4 F4 1D 02 20 5C BD AA CA F5 48 72 0E ....... \....Hr. 0100: 71 2C F2 A0 4F AE 5B F1 CF FF A4 75 E6 63 E6 40 q,..O.[....u.c.@ 0110: 79 D8 F7 CF 64 49 BF 43 A0 82 02 72 30 82 02 6E y...dI.C...r0..n 0120: 30 82 02 6A 30 82 01 EF A0 03 02 01 02 02 10 01 0..j0........... 0130: 94 5C 40 3E 17 DB 37 06 5B 4B B3 22 A0 A7 38 30 .\@>..7.[K."..80 0140: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 59 31 0B 30 ...*.H.=...0Y1.0 0150: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0160: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0170: 6E 76 2D 73 61 31 2F 30 2D 06 03 55 04 03 13 26 nv-sa1/0-..U...& 0180: 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 GlobalSign Atlas 0190: 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 20 32 E46 EV TLS CA 2 01A0: 30 32 33 20 51 34 30 1E 17 0D 32 34 30 35 31 33 023 Q40...240513 01B0: 30 35 32 35 33 36 5A 17 0D 32 34 30 35 32 30 30 052536Z..2405200 01C0: 35 32 35 33 36 5A 30 6A 31 0B 30 09 06 03 55 04 52536Z0j1.0...U. 01D0: 06 13 02 42 45 31 19 30 17 06 03 55 04 0A 0C 10 ...BE1.0...U.... 01E0: 47 6C 6F 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 GlobalSign nv-sa 01F0: 31 40 30 3E 06 03 55 04 03 0C 37 47 6C 6F 62 61 1@0>..U...7Globa 0200: 6C 53 69 67 6E 20 41 74 6C 61 73 20 45 34 36 20 lSign Atlas E46 0210: 45 56 20 54 4C 53 20 43 41 20 32 30 32 33 20 51 EV TLS CA 2023 Q 0220: 34 20 2D 20 4F 43 53 50 20 52 65 73 70 6F 6E 64 4 - OCSP Respond 0230: 65 72 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 er0Y0...*.H.=... 0240: 08 2A 86 48 CE 3D 03 01 07 03 42 00 04 31 BA 4B .*.H.=....B..1.K 0250: FF 30 16 B0 F8 E8 EA D9 50 64 FF DA EA 7E 84 88 .0......Pd...... 0260: 15 CE B7 31 60 07 08 D8 C2 D4 65 5E B2 59 B0 72 ...1`.....e^.Y.r 0270: E8 E1 20 F0 6A 6A 36 B9 B2 82 F7 F9 E6 65 54 31 .. .jj6......eT1 0280: A8 7F 86 6A 75 6B 1B 7D 33 06 4C 64 40 A3 81 87 ...juk..3.Ld@... 0290: 30 81 84 30 0F 06 09 2B 06 01 05 05 07 30 01 05 0..0...+.....0.. 02A0: 04 02 05 00 30 0E 06 03 55 1D 0F 01 01 FF 04 04 ....0...U....... 02B0: 03 02 07 80 30 13 06 03 55 1D 25 04 0C 30 0A 06 ....0...U.%..0.. 02C0: 08 2B 06 01 05 05 07 03 09 30 1D 06 03 55 1D 0E .+.......0...U.. 02D0: 04 16 04 14 19 17 98 FD 8F 82 B1 B5 A3 BC 80 FD ................ 02E0: B1 D5 E3 49 B0 01 8A 35 30 0C 06 03 55 1D 13 01 ...I...50...U... 02F0: 01 FF 04 02 30 00 30 1F 06 03 55 1D 23 04 18 30 ....0.0...U.#..0 0300: 16 80 14 5E C4 F2 F2 F8 D0 CF 0D 79 A3 4F 69 21 ...^.......y.Oi! 0310: F1 41 71 7D 53 65 60 30 0A 06 08 2A 86 48 CE 3D .Aq.Se`0...*.H.= 0320: 04 03 03 03 69 00 30 66 02 31 00 8E 1D 2F 57 8D ....i.0f.1.../W. 0330: A6 2D 10 EB 88 51 D7 B0 A2 EE 72 3A 2C BD 7D 16 .-...Q....r:,... 0340: 9E F2 2A 51 6F DA CB AA 15 40 EC 97 41 E7 5E 82 ..*Qo....@..A.^. 0350: CD 2B 5E 08 15 92 CD 80 F8 60 E9 02 31 00 80 E5 .+^......`..1... 0360: C4 7E A3 5D DE D4 50 6A 37 F2 F0 CA 44 51 45 AF ...]..Pj7...DQE. 0370: 4A D1 DE 0B 57 BC 95 01 2A A8 AF 1C 53 EA B1 4B J...W...*...S..K 0380: 8D D0 C7 5A 63 16 91 D9 D9 D9 34 C5 61 AB certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 191798FD8F82B1B5A3BC80FDB1D5E349B0018A35 certpath: OCSP response produced at: Thu May 16 19:32:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Thu May 16 19:00:00 CST 2024 certpath: nextUpdate: Fri May 17 07:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Thu May 16 19:00:00 CST 2024 until Fri May 17 07:00:00 CST 2024 certpath: Checking validity of OCSP response on Thu May 16 19:37:37 CST 2024 with allowed interval between Thu May 16 19:22:37 CST 2024 and Thu May 16 19:52:37 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert2 validation succeeded. certpath: Cert path validation succeeded. (PKIX validation algorithm) certpath: -------------------------------------------------------------- certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC rerun: cd /var/tmp/tone/run/jtreg/jt-work/test_jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46 && \ DISPLAY=:7 \ HOME=/home/testUserForTone \ JTREG_VERSION=jtreg-7.3.1.1 \ LANG=C \ LC_CTYPE=C.UTF-8 \ LD_LIBRARY_PATH= \ PATH=/bin:/usr/bin:/usr/sbin \ TEST_IMAGE_DIR=/var/tmp/tone/run/jtreg/test-images \ CLASSPATH=/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/test/lib:/var/tmp/tone/run/jtreg/jdk-repo/test/lib:/var/tmp/tone/run/jtreg/jtreg/lib/javatest.jar:/var/tmp/tone/run/jtreg/jtreg/lib/jtreg.jar \ /var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk/bin/java \ -Dtest.vm.opts='-Djdk.lang.processReaperUseDefaultStackSize=true -Dtest.wisp.socketAddress=www.alibabacloud.com -Xmixed -ea -esa' \ -Dtest.tool.vm.opts='-J-Djdk.lang.processReaperUseDefaultStackSize=true -J-Dtest.wisp.socketAddress=www.alibabacloud.com -J-Xmixed -J-ea -J-esa' \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk=/var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk \ -Dcompile.jdk=/var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk \ -Dtest.timeout.factor=4.0 \ -Dtest.nativepath=/var/tmp/tone/run/jtreg/test-images/hotspot/jtreg/native \ -Dtest.root=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk \ -Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -Dtest.file=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -Dtest.src=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -Dtest.src.path=/var/tmp/tone/run/jtreg/jdk-repo/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/var/tmp/tone/run/jtreg/jdk-repo/test/lib \ -Dtest.classes=/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -Dtest.class.path=/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/var/tmp/tone/run/jtreg/jt-work/test_jdk/classes/34/test/lib \ -Djdk.lang.processReaperUseDefaultStackSize=true \ -Dtest.wisp.socketAddress=www.alibabacloud.com \ -Xmixed \ -ea \ -esa \ -Djava.library.path=/var/tmp/tone/run/jtreg/test-images/hotspot/jtreg/native \ -Djava.security.debug=certpath,ocsp \ -Dcom.sun.security.ocsp.useget=false \ com.sun.javatest.regtest.agent.MainWrapper /var/tmp/tone/run/jtreg/jt-work/test_jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d/main.1.jta globalsigne46 OCSP TEST RESULT: Error. Program `/var/tmp/tone/run/jtreg/jdk-repo/build/linux-x86_64-server-release/images/jdk/bin/java' timed out (timeout set to 480000ms, elapsed time including timeout handling was 480208ms).