Directory "tmp-jtreg-CAInterop.java_globalsigne46/index-1320" not found: creating -------------------------------------------------- TEST: security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 TEST JDK: /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk ACTION: build -- Passed. Build successful REASON: User specified action: run build jtreg.SkippedException ValidatePathWithURL CAInterop TIME: 3.529 seconds messages: command: build jtreg.SkippedException ValidatePathWithURL CAInterop reason: User specified action: run build jtreg.SkippedException ValidatePathWithURL CAInterop started: Sat May 18 15:57:12 CST 2024 Library /test/lib: compile: jtreg.SkippedException Test directory: compile: ValidatePathWithURL, CAInterop finished: Sat May 18 15:57:15 CST 2024 elapsed time (seconds): 3.529 ACTION: compile -- Passed. Compilation successful REASON: .class file out of date or does not exist TIME: 1.387 seconds messages: command: compile /home/yansendao/git/jdk/test/lib/jtreg/SkippedException.java reason: .class file out of date or does not exist started: Sat May 18 15:57:12 CST 2024 Mode: othervm finished: Sat May 18 15:57:13 CST 2024 elapsed time (seconds): 1.387 configuration: javac compilation environment source path: /home/yansendao/git/jdk/test/lib class path: /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib rerun: cd /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/scratch && \ DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/995/bus \ DISPLAY=:7 \ HOME=/home/yansendao \ LANG=en_US.UTF-8 \ PATH=/bin:/usr/bin:/usr/sbin \ XDG_RUNTIME_DIR=/run/user/995 \ XDG_SESSION_ID=282 \ /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/javac \ -J-ea \ -J-esa \ -J-Dtest.vm.opts='-ea -esa' \ -J-Dtest.tool.vm.opts='-J-ea -J-esa' \ -J-Dtest.compiler.opts= \ -J-Dtest.java.opts= \ -J-Dtest.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -J-Dcompile.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -J-Dtest.timeout.factor=4.0 \ -J-Dtest.root=/home/yansendao/git/jdk/test/jdk \ -J-Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -J-Dtest.file=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -J-Dtest.src=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -J-Dtest.src.path=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -J-Dtest.classes=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -J-Dtest.class.path=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -d /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -sourcepath /home/yansendao/git/jdk/test/lib \ -classpath /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib /home/yansendao/git/jdk/test/lib/jtreg/SkippedException.java STDOUT: STDERR: ACTION: compile -- Passed. Compilation successful REASON: .class file out of date or does not exist TIME: 2.128 seconds messages: command: compile /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java reason: .class file out of date or does not exist started: Sat May 18 15:57:13 CST 2024 Mode: othervm finished: Sat May 18 15:57:15 CST 2024 elapsed time (seconds): 2.128 configuration: javac compilation environment source path: /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification /home/yansendao/git/jdk/test/lib class path: /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib rerun: cd /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/scratch && \ DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/995/bus \ DISPLAY=:7 \ HOME=/home/yansendao \ LANG=en_US.UTF-8 \ PATH=/bin:/usr/bin:/usr/sbin \ XDG_RUNTIME_DIR=/run/user/995 \ XDG_SESSION_ID=282 \ /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/javac \ -J-ea \ -J-esa \ -J-Dtest.vm.opts='-ea -esa' \ -J-Dtest.tool.vm.opts='-J-ea -J-esa' \ -J-Dtest.compiler.opts= \ -J-Dtest.java.opts= \ -J-Dtest.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -J-Dcompile.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -J-Dtest.timeout.factor=4.0 \ -J-Dtest.root=/home/yansendao/git/jdk/test/jdk \ -J-Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -J-Dtest.file=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -J-Dtest.src=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -J-Dtest.src.path=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -J-Dtest.classes=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -J-Dtest.class.path=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -d /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -sourcepath /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -classpath /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java STDOUT: STDERR: Note: /home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/ValidatePathWithURL.java uses or overrides a deprecated API. Note: Recompile with -Xlint:deprecation for details. ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.0 seconds messages: command: build CAInterop reason: Named class compiled on demand started: Sat May 18 15:57:15 CST 2024 finished: Sat May 18 15:57:15 CST 2024 elapsed time (seconds): 0.0 ACTION: main -- Passed. Execution successful REASON: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP TIME: 3.244 seconds messages: command: main -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP reason: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP started: Sat May 18 15:57:15 CST 2024 Mode: othervm [/othervm specified] finished: Sat May 18 15:57:19 CST 2024 elapsed time (seconds): 3.244 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== http.proxyHost :null http.proxyPort :null https.proxyHost :null https.proxyPort :null https.socksProxyHost :null https.socksProxyPort :null jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01 com.sun.security.enableCRLDP :false ocsp.enable :true ===================================================== ===== Validate https://valid.e46.roots.globalsign.com===== Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS ===== Validate https://revoked.e46.roots.globalsign.com===== SSLHandshakeException: (certificate_revoked) PKIX path validation failed: java.security.cert.CertPathValidatorException: Certificate has been revoked, reason: UNSPECIFIED, revocation date: Mon Oct 23 20:29:02 CST 2023, authority: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE, extension OIDs: [] Certificate is revoked Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS STDERR: certpath: Constraints: 3DES_EDE_CBC certpath: Constraints: anon certpath: Constraints: DES certpath: Constraints: DH keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DTLSv1.0 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: ECDH certpath: Constraints: MD5withRSA certpath: Constraints: NULL certpath: Constraints: RC4 certpath: Constraints: SSLv3 certpath: Constraints: TLSv1 certpath: Constraints: TLSv1.1 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Sat May 18 15:57:17 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Sat May 18 15:57:17 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:17 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: com.sun.security.ocsp.timeout set to 15000 milliseconds certpath: com.sun.security.ocsp.readtimeout set to 15000 milliseconds certpath: com.sun.security.ocsp.useget set to true certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 38 30 35 32 31 35 30 5A 30 73 0240518052150Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 38 30 35 32 31 35 30 5A .20240518052150Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 32 30 35 32 31 ....202405220521 00C0: 34 39 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 49Z0...*.H...... 00D0: 05 00 03 82 01 01 00 54 94 E7 B6 5C 4F 91 23 48 .......T...\O.#H 00E0: E9 3F BC EB 4F 87 B3 EB 66 B3 9F 53 EA D4 3E 01 .?..O...f..S..>. 00F0: EB EC 60 77 2C A8 E7 8B 65 CC 4E 22 BE 1F 2E F1 ..`w,...e.N".... 0100: 15 F3 54 FD 4B 4E 61 AA E5 D7 B1 99 30 D4 42 D1 ..T.KNa.....0.B. 0110: 52 06 DA 22 D9 AB 20 6B 3E 4C DE B8 7B 63 27 63 R..".. k>L...c'c 0120: B3 E1 C5 0B C5 FC 18 8A 1C 6D 51 36 57 31 DD 34 .........mQ6W1.4 0130: A0 9D 2E 7D DB A0 73 B4 93 E3 8D C5 FF AE 70 42 ......s.......pB 0140: 61 91 B2 FE DE 8C 98 49 49 A3 5E 0E 01 72 4F A3 a......II.^..rO. 0150: 61 13 D5 F0 B5 B9 B3 AF FE 50 C9 FA CF AB 54 D2 a........P....T. 0160: 55 A1 30 D1 14 4C 23 95 88 1C 05 89 97 97 21 D7 U.0..L#.......!. 0170: 8A 03 99 56 EF 95 77 E1 CB 06 C8 1A 16 63 99 F3 ...V..w......c.. 0180: 74 40 7C 16 9F 7C D6 94 0F F5 82 76 EF A1 37 D3 t@.........v..7. 0190: C7 28 11 2F A2 19 9C 40 33 4C 93 67 45 AA 56 C2 .(./...@3L.gE.V. 01A0: B5 E6 26 70 5F DF 0D 44 6D CD CA 1B 50 2C 30 57 ..&p_..Dm...P,0W 01B0: 26 ED 11 1B F3 4F FE 7A 9D CE 15 D1 40 10 9E BE &....O.z....@... 01C0: A2 5B D7 E5 D4 3A 3E 05 BE 32 FA 5E 86 9A AE E3 .[...:>..2.^.... 01D0: D0 F9 3F D0 1B 00 08 A0 82 03 1A 30 82 03 16 30 ..?........0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Sat May 18 13:21:50 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 13:21:50 CST 2024 certpath: nextUpdate: Wed May 22 13:21:49 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 13:21:50 CST 2024 until Wed May 22 13:21:49 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:17 CST 2024 with allowed interval between Sat May 18 15:42:17 CST 2024 and Sat May 18 16:12:17 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Sat May 18 15:57:17 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:17 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 C7 71 FD DA A6 99 85 E4 B6 61 75 F2 `....q.......au. 0050: 65 C5 8A certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 8B 0A 01 00 A0 82 03 84 30 82 03 80 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 71 30 82 .+.....0.....q0. 0020: 03 6D 30 81 9E A2 16 04 14 55 BE 5B 96 18 50 6F .m0......U.[..Po 0030: 0C 30 4E 3F 45 25 EC A8 3D 12 5E 64 08 18 0F 32 .0N?E%..=.^d...2 0040: 30 32 34 30 35 31 38 30 37 33 39 30 30 5A 30 73 0240518073900Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 16 FA .........d.s.T.. 0070: EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF 0D 79 ...j...^.......y 0080: A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 C7 71 .Oi!.Aq.Se`....q 0090: FD DA A6 99 85 E4 B6 61 75 F2 65 C5 8A 80 00 18 .......au.e..... 00A0: 0F 32 30 32 34 30 35 31 38 30 37 30 30 30 30 5A .20240518070000Z 00B0: A0 11 18 0F 32 30 32 34 30 35 31 38 31 39 30 30 ....202405181900 00C0: 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 00Z0...*.H.=.... 00D0: 49 00 30 46 02 21 00 AE AA A7 AD 54 33 ED 74 FC I.0F.!.....T3.t. 00E0: C0 91 E5 42 B4 FE 6B EC 38 76 35 75 BD AD D3 B3 ...B..k.8v5u.... 00F0: 20 F7 B6 95 32 B6 C2 02 21 00 AB DA 1F 46 88 30 ...2...!....F.0 0100: E6 7C BE DC E2 C7 CF 24 D8 A5 E8 CC EA 09 AA 58 .......$.......X 0110: 2D C1 EF F3 22 06 FF 14 F4 DD A0 82 02 71 30 82 -..."........q0. 0120: 02 6D 30 82 02 69 30 82 01 EF A0 03 02 01 02 02 .m0..i0......... 0130: 10 01 F0 F1 F1 74 59 48 F8 D3 C0 6E BD E7 78 8C .....tYH...n..x. 0140: 83 30 0A 06 08 2A 86 48 CE 3D 04 03 03 30 59 31 .0...*.H.=...0Y1 0150: 0B 30 09 06 03 55 04 06 13 02 42 45 31 19 30 17 .0...U....BE1.0. 0160: 06 03 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 ..U....GlobalSig 0170: 6E 20 6E 76 2D 73 61 31 2F 30 2D 06 03 55 04 03 n nv-sa1/0-..U.. 0180: 13 26 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C .&GlobalSign Atl 0190: 61 73 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 as E46 EV TLS CA 01A0: 20 32 30 32 33 20 51 34 30 1E 17 0D 32 34 30 35 2023 Q40...2405 01B0: 31 37 31 32 32 39 34 31 5A 17 0D 32 34 30 35 32 17122941Z..24052 01C0: 34 31 32 32 39 34 31 5A 30 6A 31 0B 30 09 06 03 4122941Z0j1.0... 01D0: 55 04 06 13 02 42 45 31 19 30 17 06 03 55 04 0A U....BE1.0...U.. 01E0: 0C 10 47 6C 6F 62 61 6C 53 69 67 6E 20 6E 76 2D ..GlobalSign nv- 01F0: 73 61 31 40 30 3E 06 03 55 04 03 0C 37 47 6C 6F sa1@0>..U...7Glo 0200: 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 20 45 34 balSign Atlas E4 0210: 36 20 45 56 20 54 4C 53 20 43 41 20 32 30 32 33 6 EV TLS CA 2023 0220: 20 51 34 20 2D 20 4F 43 53 50 20 52 65 73 70 6F Q4 - OCSP Respo 0230: 6E 64 65 72 30 59 30 13 06 07 2A 86 48 CE 3D 02 nder0Y0...*.H.=. 0240: 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 00 04 17 ...*.H.=....B... 0250: 7B C8 D3 63 10 C5 2B 40 BD 7C 6B A4 E1 5F 2F BE ...c..+@..k.._/. 0260: BA F0 9F 49 BA 32 9F 60 56 F5 E0 06 0C 89 EC 8E ...I.2.`V....... 0270: 8E 16 18 90 87 EB 72 FD 5D F4 79 D3 6F 60 A8 2A ......r.].y.o`.* 0280: FC 69 C8 09 60 A3 91 3B D3 D6 B2 9E E3 99 34 A3 .i..`..;......4. 0290: 81 87 30 81 84 30 0F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 02A0: 01 05 04 02 05 00 30 0E 06 03 55 1D 0F 01 01 FF ......0...U..... 02B0: 04 04 03 02 07 80 30 13 06 03 55 1D 25 04 0C 30 ......0...U.%..0 02C0: 0A 06 08 2B 06 01 05 05 07 03 09 30 1D 06 03 55 ...+.......0...U 02D0: 1D 0E 04 16 04 14 55 BE 5B 96 18 50 6F 0C 30 4E ......U.[..Po.0N 02E0: 3F 45 25 EC A8 3D 12 5E 64 08 30 0C 06 03 55 1D ?E%..=.^d.0...U. 02F0: 13 01 01 FF 04 02 30 00 30 1F 06 03 55 1D 23 04 ......0.0...U.#. 0300: 18 30 16 80 14 5E C4 F2 F2 F8 D0 CF 0D 79 A3 4F .0...^.......y.O 0310: 69 21 F1 41 71 7D 53 65 60 30 0A 06 08 2A 86 48 i!.Aq.Se`0...*.H 0320: CE 3D 04 03 03 03 68 00 30 65 02 30 31 5A 69 38 .=....h.0e.01Zi8 0330: DB E4 7A 3D F6 82 51 8E 24 FB 62 D0 4D B8 7D C7 ..z=..Q.$.b.M... 0340: 8A E9 50 F0 CE FC 46 FC 7A B5 16 17 D0 16 76 81 ..P...F.z.....v. 0350: 7A 49 70 32 B1 D9 EE 05 6A 5E 08 0F 02 31 00 8E zIp2....j^...1.. 0360: A2 0C A0 2D CA 39 47 C3 2A 55 4F DE 1C D7 32 4E ...-.9G.*UO...2N 0370: D7 CC 44 69 69 B1 DE 37 64 73 C0 F5 D8 1E 43 25 ..Dii..7ds....C% 0380: ED 29 3A 65 DD 72 AA 1D FC 3E 3A FB 78 B3 C8 certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 55BE5B9618506F0C304E3F4525ECA83D125E6408 certpath: OCSP response produced at: Sat May 18 15:39:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 15:00:00 CST 2024 certpath: nextUpdate: Sun May 19 03:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 15:00:00 CST 2024 until Sun May 19 03:00:00 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:17 CST 2024 with allowed interval between Sat May 18 15:42:17 CST 2024 and Sat May 18 16:12:17 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert2 validation succeeded. certpath: Cert path validation succeeded. (PKIX validation algorithm) certpath: -------------------------------------------------------------- certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Sat May 18 15:57:18 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Sat May 18 15:57:18 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:18 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 38 30 35 32 31 35 30 5A 30 73 0240518052150Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 38 30 35 32 31 35 30 5A .20240518052150Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 32 30 35 32 31 ....202405220521 00C0: 34 39 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 49Z0...*.H...... 00D0: 05 00 03 82 01 01 00 54 94 E7 B6 5C 4F 91 23 48 .......T...\O.#H 00E0: E9 3F BC EB 4F 87 B3 EB 66 B3 9F 53 EA D4 3E 01 .?..O...f..S..>. 00F0: EB EC 60 77 2C A8 E7 8B 65 CC 4E 22 BE 1F 2E F1 ..`w,...e.N".... 0100: 15 F3 54 FD 4B 4E 61 AA E5 D7 B1 99 30 D4 42 D1 ..T.KNa.....0.B. 0110: 52 06 DA 22 D9 AB 20 6B 3E 4C DE B8 7B 63 27 63 R..".. k>L...c'c 0120: B3 E1 C5 0B C5 FC 18 8A 1C 6D 51 36 57 31 DD 34 .........mQ6W1.4 0130: A0 9D 2E 7D DB A0 73 B4 93 E3 8D C5 FF AE 70 42 ......s.......pB 0140: 61 91 B2 FE DE 8C 98 49 49 A3 5E 0E 01 72 4F A3 a......II.^..rO. 0150: 61 13 D5 F0 B5 B9 B3 AF FE 50 C9 FA CF AB 54 D2 a........P....T. 0160: 55 A1 30 D1 14 4C 23 95 88 1C 05 89 97 97 21 D7 U.0..L#.......!. 0170: 8A 03 99 56 EF 95 77 E1 CB 06 C8 1A 16 63 99 F3 ...V..w......c.. 0180: 74 40 7C 16 9F 7C D6 94 0F F5 82 76 EF A1 37 D3 t@.........v..7. 0190: C7 28 11 2F A2 19 9C 40 33 4C 93 67 45 AA 56 C2 .(./...@3L.gE.V. 01A0: B5 E6 26 70 5F DF 0D 44 6D CD CA 1B 50 2C 30 57 ..&p_..Dm...P,0W 01B0: 26 ED 11 1B F3 4F FE 7A 9D CE 15 D1 40 10 9E BE &....O.z....@... 01C0: A2 5B D7 E5 D4 3A 3E 05 BE 32 FA 5E 86 9A AE E3 .[...:>..2.^.... 01D0: D0 F9 3F D0 1B 00 08 A0 82 03 1A 30 82 03 16 30 ..?........0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Sat May 18 13:21:50 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 13:21:50 CST 2024 certpath: nextUpdate: Wed May 22 13:21:49 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 13:21:50 CST 2024 until Wed May 22 13:21:49 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:18 CST 2024 with allowed interval between Sat May 18 15:42:18 CST 2024 and Sat May 18 16:12:18 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Sat May 18 15:57:18 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:18 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 `....'u.T....... 0050: C7 3A 20 certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 9E 0A 01 00 A0 82 03 97 30 82 03 93 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 84 30 82 .+.....0......0. 0020: 03 80 30 81 B1 A2 16 04 14 33 A9 AB 48 EC B6 BD ..0......3..H... 0030: 0E 42 CF EF CE FB A2 AE D1 7C C3 07 79 18 0F 32 .B..........y..2 0040: 30 32 34 30 35 31 38 30 37 33 39 30 30 5A 30 81 0240518073900Z0. 0050: 85 30 81 82 30 49 30 09 06 05 2B 0E 03 02 1A 05 .0..0I0...+..... 0060: 00 04 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 ...........d.s.T 0070: 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF .....j...^...... 0080: 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 .y.Oi!.Aq.Se`... 0090: E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 C7 3A 20 A1 .'u.T........: . 00A0: 11 18 0F 32 30 32 33 31 30 32 33 31 32 32 39 30 ...2023102312290 00B0: 32 5A 18 0F 32 30 32 34 30 35 31 38 30 37 30 30 2Z..202405180700 00C0: 30 30 5A A0 11 18 0F 32 30 32 34 30 35 31 38 31 00Z....202405181 00D0: 39 30 30 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 90000Z0...*.H.=. 00E0: 03 02 03 49 00 30 46 02 21 00 D7 5E 5A 01 31 E4 ...I.0F.!..^Z.1. 00F0: B7 59 E7 7A 1A 81 FB DA 01 E6 B7 80 33 62 43 4D .Y.z........3bCM 0100: 2D 3C F1 83 78 CE 09 E0 E0 D0 02 21 00 FE 93 B2 -<..x......!.... 0110: 4F D2 4D BC 5B 38 D3 62 51 8E 2F 7A 00 29 E2 6E O.M.[8.bQ./z.).n 0120: C8 6B 96 5A 89 75 F0 97 C7 0A 8C 51 B8 A0 82 02 .k.Z.u.....Q.... 0130: 71 30 82 02 6D 30 82 02 69 30 82 01 EF A0 03 02 q0..m0..i0...... 0140: 01 02 02 10 01 9A C4 75 15 74 A6 35 76 E5 EF F1 .......u.t.5v... 0150: E6 12 4A 04 30 0A 06 08 2A 86 48 CE 3D 04 03 03 ..J.0...*.H.=... 0160: 30 59 31 0B 30 09 06 03 55 04 06 13 02 42 45 31 0Y1.0...U....BE1 0170: 19 30 17 06 03 55 04 0A 13 10 47 6C 6F 62 61 6C .0...U....Global 0180: 53 69 67 6E 20 6E 76 2D 73 61 31 2F 30 2D 06 03 Sign nv-sa1/0-.. 0190: 55 04 03 13 26 47 6C 6F 62 61 6C 53 69 67 6E 20 U...&GlobalSign 01A0: 41 74 6C 61 73 20 45 34 36 20 45 56 20 54 4C 53 Atlas E46 EV TLS 01B0: 20 43 41 20 32 30 32 33 20 51 34 30 1E 17 0D 32 CA 2023 Q40...2 01C0: 34 30 35 31 38 30 35 32 35 35 36 5A 17 0D 32 34 40518052556Z..24 01D0: 30 35 32 35 30 35 32 35 35 36 5A 30 6A 31 0B 30 0525052556Z0j1.0 01E0: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 01F0: 55 04 0A 0C 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0200: 6E 76 2D 73 61 31 40 30 3E 06 03 55 04 03 0C 37 nv-sa1@0>..U...7 0210: 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 GlobalSign Atlas 0220: 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 20 32 E46 EV TLS CA 2 0230: 30 32 33 20 51 34 20 2D 20 4F 43 53 50 20 52 65 023 Q4 - OCSP Re 0240: 73 70 6F 6E 64 65 72 30 59 30 13 06 07 2A 86 48 sponder0Y0...*.H 0250: CE 3D 02 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 .=....*.H.=....B 0260: 00 04 62 15 07 7C 96 DF 4F D5 E4 79 67 4B 54 18 ..b.....O..ygKT. 0270: 6D 72 9C 11 77 73 02 A0 62 A0 30 32 CA B3 8E 20 mr..ws..b.02... 0280: 23 1A 37 05 36 0B 16 97 C5 58 63 C7 38 85 CE 75 #.7.6....Xc.8..u 0290: D0 F6 E4 6A 52 9D 62 B2 CC BC 93 F8 86 36 8A 93 ...jR.b......6.. 02A0: BE B8 A3 81 87 30 81 84 30 0F 06 09 2B 06 01 05 .....0..0...+... 02B0: 05 07 30 01 05 04 02 05 00 30 0E 06 03 55 1D 0F ..0......0...U.. 02C0: 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 1D 25 .........0...U.% 02D0: 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 30 1D ..0...+.......0. 02E0: 06 03 55 1D 0E 04 16 04 14 33 A9 AB 48 EC B6 BD ..U......3..H... 02F0: 0E 42 CF EF CE FB A2 AE D1 7C C3 07 79 30 0C 06 .B..........y0.. 0300: 03 55 1D 13 01 01 FF 04 02 30 00 30 1F 06 03 55 .U.......0.0...U 0310: 1D 23 04 18 30 16 80 14 5E C4 F2 F2 F8 D0 CF 0D .#..0...^....... 0320: 79 A3 4F 69 21 F1 41 71 7D 53 65 60 30 0A 06 08 y.Oi!.Aq.Se`0... 0330: 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 02 31 00 *.H.=....h.0e.1. 0340: EC CA 11 E7 1E 45 E6 AB 29 6D 47 01 04 B5 8A 8A .....E..)mG..... 0350: 38 D9 1E 4A 03 01 C7 CA 81 A3 AD F6 4E 0A 21 84 8..J........N.!. 0360: 6D 6C C2 3C D0 80 D8 E2 A7 C6 2B BC 17 93 07 D6 ml.<......+..... 0370: 02 30 3D 7E 6E DD DC D0 57 85 13 44 A6 E7 58 D4 .0=.n...W..D..X. 0380: CE ED BD 03 9B 2C 0F BD 9A EE DE C0 2D A5 F2 B5 .....,......-... 0390: 03 37 B4 62 17 6E 4E 99 D7 BA 6A 22 93 61 71 D0 .7.b.nN...j".aq. 03A0: D5 D2 certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 33A9AB48ECB6BD0E42CFEFCEFBA2AED17CC30779 certpath: OCSP response produced at: Sat May 18 15:39:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: Revocation time: Mon Oct 23 20:29:02 CST 2023 certpath: Revocation reason: UNSPECIFIED certpath: thisUpdate: Sat May 18 15:00:00 CST 2024 certpath: nextUpdate: Sun May 19 03:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20) is: REVOKED certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 15:00:00 CST 2024 until Sun May 19 03:00:00 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:19 CST 2024 with allowed interval between Sat May 18 15:42:19 CST 2024 and Sat May 18 16:12:19 CST 2024 certpath: X509CertSelector.match(Serial number: 00:9b:7e:06:49:a3:3e:62:b9:d5:ee:90:48:71:29:ef:57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 01:00:20 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match STATUS:Passed. rerun: cd /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/scratch && \ DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/995/bus \ DISPLAY=:7 \ HOME=/home/yansendao \ LANG=en_US.UTF-8 \ PATH=/bin:/usr/bin:/usr/sbin \ XDG_RUNTIME_DIR=/run/user/995 \ XDG_SESSION_ID=282 \ CLASSPATH=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib:/home/yansendao/git/jdk/test/lib:/home/yansendao/software/jdk/jtreg-7/lib/javatest.jar:/home/yansendao/software/jdk/jtreg-7/lib/jtreg.jar \ /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/java \ -Dtest.vm.opts='-ea -esa' \ -Dtest.tool.vm.opts='-J-ea -J-esa' \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dcompile.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dtest.timeout.factor=4.0 \ -Dtest.root=/home/yansendao/git/jdk/test/jdk \ -Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -Dtest.file=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -Dtest.src=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -Dtest.src.path=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -Dtest.classes=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -Dtest.class.path=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -ea \ -esa \ -Djava.security.debug=certpath,ocsp \ com.sun.javatest.regtest.agent.MainWrapper /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d/main.0.jta globalsigne46 OCSP ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.0 seconds messages: command: build CAInterop reason: Named class compiled on demand started: Sat May 18 15:57:19 CST 2024 finished: Sat May 18 15:57:19 CST 2024 elapsed time (seconds): 0.0 ACTION: main -- Passed. Execution successful REASON: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp -Dcom.sun.security.ocsp.useget=false CAInterop globalsigne46 OCSP TIME: 4.207 seconds messages: command: main -Djava.security.debug=certpath,ocsp -Dcom.sun.security.ocsp.useget=false CAInterop globalsigne46 OCSP reason: User specified action: run main/othervm -Djava.security.debug=certpath,ocsp -Dcom.sun.security.ocsp.useget=false CAInterop globalsigne46 OCSP started: Sat May 18 15:57:19 CST 2024 Mode: othervm [/othervm specified] finished: Sat May 18 15:57:23 CST 2024 elapsed time (seconds): 4.207 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== http.proxyHost :null http.proxyPort :null https.proxyHost :null https.proxyPort :null https.socksProxyHost :null https.socksProxyPort :null jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01 com.sun.security.enableCRLDP :false ocsp.enable :true ===================================================== ===== Validate https://valid.e46.roots.globalsign.com===== Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS ===== Validate https://revoked.e46.roots.globalsign.com===== SSLHandshakeException: (certificate_revoked) PKIX path validation failed: java.security.cert.CertPathValidatorException: Certificate has been revoked, reason: UNSPECIFIED, revocation date: Mon Oct 23 20:29:02 CST 2023, authority: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE, extension OIDs: [] Certificate is revoked Finding intermediate certificate issued by CA Checking: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Checking: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Found intermediate root CA: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE intermediate CA Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Verified: Intermediate CA signed by test root CA ======> SUCCESS STDERR: certpath: Constraints: 3DES_EDE_CBC certpath: Constraints: anon certpath: Constraints: DES certpath: Constraints: DH keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DTLSv1.0 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: ECDH certpath: Constraints: MD5withRSA certpath: Constraints: NULL certpath: Constraints: RC4 certpath: Constraints: SSLv3 certpath: Constraints: TLSv1 certpath: Constraints: TLSv1.1 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Sat May 18 15:57:20 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Sat May 18 15:57:20 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:20 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: com.sun.security.ocsp.timeout set to 15000 milliseconds certpath: com.sun.security.ocsp.readtimeout set to 15000 milliseconds certpath: com.sun.security.ocsp.useget set to false certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 38 30 35 32 31 35 30 5A 30 73 0240518052150Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 38 30 35 32 31 35 30 5A .20240518052150Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 32 30 35 32 31 ....202405220521 00C0: 34 39 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 49Z0...*.H...... 00D0: 05 00 03 82 01 01 00 54 94 E7 B6 5C 4F 91 23 48 .......T...\O.#H 00E0: E9 3F BC EB 4F 87 B3 EB 66 B3 9F 53 EA D4 3E 01 .?..O...f..S..>. 00F0: EB EC 60 77 2C A8 E7 8B 65 CC 4E 22 BE 1F 2E F1 ..`w,...e.N".... 0100: 15 F3 54 FD 4B 4E 61 AA E5 D7 B1 99 30 D4 42 D1 ..T.KNa.....0.B. 0110: 52 06 DA 22 D9 AB 20 6B 3E 4C DE B8 7B 63 27 63 R..".. k>L...c'c 0120: B3 E1 C5 0B C5 FC 18 8A 1C 6D 51 36 57 31 DD 34 .........mQ6W1.4 0130: A0 9D 2E 7D DB A0 73 B4 93 E3 8D C5 FF AE 70 42 ......s.......pB 0140: 61 91 B2 FE DE 8C 98 49 49 A3 5E 0E 01 72 4F A3 a......II.^..rO. 0150: 61 13 D5 F0 B5 B9 B3 AF FE 50 C9 FA CF AB 54 D2 a........P....T. 0160: 55 A1 30 D1 14 4C 23 95 88 1C 05 89 97 97 21 D7 U.0..L#.......!. 0170: 8A 03 99 56 EF 95 77 E1 CB 06 C8 1A 16 63 99 F3 ...V..w......c.. 0180: 74 40 7C 16 9F 7C D6 94 0F F5 82 76 EF A1 37 D3 t@.........v..7. 0190: C7 28 11 2F A2 19 9C 40 33 4C 93 67 45 AA 56 C2 .(./...@3L.gE.V. 01A0: B5 E6 26 70 5F DF 0D 44 6D CD CA 1B 50 2C 30 57 ..&p_..Dm...P,0W 01B0: 26 ED 11 1B F3 4F FE 7A 9D CE 15 D1 40 10 9E BE &....O.z....@... 01C0: A2 5B D7 E5 D4 3A 3E 05 BE 32 FA 5E 86 9A AE E3 .[...:>..2.^.... 01D0: D0 F9 3F D0 1B 00 08 A0 82 03 1A 30 82 03 16 30 ..?........0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Sat May 18 13:21:50 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 13:21:50 CST 2024 certpath: nextUpdate: Wed May 22 13:21:49 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 13:21:50 CST 2024 until Wed May 22 13:21:49 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:21 CST 2024 with allowed interval between Sat May 18 15:42:21 CST 2024 and Sat May 18 16:12:21 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Sat May 18 15:57:20 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:20 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 C7 71 FD DA A6 99 85 E4 B6 61 75 F2 `....q.......au. 0050: 65 C5 8A certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 8B 0A 01 00 A0 82 03 84 30 82 03 80 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 71 30 82 .+.....0.....q0. 0020: 03 6D 30 81 9E A2 16 04 14 55 BE 5B 96 18 50 6F .m0......U.[..Po 0030: 0C 30 4E 3F 45 25 EC A8 3D 12 5E 64 08 18 0F 32 .0N?E%..=.^d...2 0040: 30 32 34 30 35 31 38 30 37 33 39 30 30 5A 30 73 0240518073900Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 16 FA .........d.s.T.. 0070: EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF 0D 79 ...j...^.......y 0080: A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 C7 71 .Oi!.Aq.Se`....q 0090: FD DA A6 99 85 E4 B6 61 75 F2 65 C5 8A 80 00 18 .......au.e..... 00A0: 0F 32 30 32 34 30 35 31 38 30 37 30 30 30 30 5A .20240518070000Z 00B0: A0 11 18 0F 32 30 32 34 30 35 31 38 31 39 30 30 ....202405181900 00C0: 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 00Z0...*.H.=.... 00D0: 49 00 30 46 02 21 00 AE AA A7 AD 54 33 ED 74 FC I.0F.!.....T3.t. 00E0: C0 91 E5 42 B4 FE 6B EC 38 76 35 75 BD AD D3 B3 ...B..k.8v5u.... 00F0: 20 F7 B6 95 32 B6 C2 02 21 00 AB DA 1F 46 88 30 ...2...!....F.0 0100: E6 7C BE DC E2 C7 CF 24 D8 A5 E8 CC EA 09 AA 58 .......$.......X 0110: 2D C1 EF F3 22 06 FF 14 F4 DD A0 82 02 71 30 82 -..."........q0. 0120: 02 6D 30 82 02 69 30 82 01 EF A0 03 02 01 02 02 .m0..i0......... 0130: 10 01 F0 F1 F1 74 59 48 F8 D3 C0 6E BD E7 78 8C .....tYH...n..x. 0140: 83 30 0A 06 08 2A 86 48 CE 3D 04 03 03 30 59 31 .0...*.H.=...0Y1 0150: 0B 30 09 06 03 55 04 06 13 02 42 45 31 19 30 17 .0...U....BE1.0. 0160: 06 03 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 ..U....GlobalSig 0170: 6E 20 6E 76 2D 73 61 31 2F 30 2D 06 03 55 04 03 n nv-sa1/0-..U.. 0180: 13 26 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C .&GlobalSign Atl 0190: 61 73 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 as E46 EV TLS CA 01A0: 20 32 30 32 33 20 51 34 30 1E 17 0D 32 34 30 35 2023 Q40...2405 01B0: 31 37 31 32 32 39 34 31 5A 17 0D 32 34 30 35 32 17122941Z..24052 01C0: 34 31 32 32 39 34 31 5A 30 6A 31 0B 30 09 06 03 4122941Z0j1.0... 01D0: 55 04 06 13 02 42 45 31 19 30 17 06 03 55 04 0A U....BE1.0...U.. 01E0: 0C 10 47 6C 6F 62 61 6C 53 69 67 6E 20 6E 76 2D ..GlobalSign nv- 01F0: 73 61 31 40 30 3E 06 03 55 04 03 0C 37 47 6C 6F sa1@0>..U...7Glo 0200: 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 20 45 34 balSign Atlas E4 0210: 36 20 45 56 20 54 4C 53 20 43 41 20 32 30 32 33 6 EV TLS CA 2023 0220: 20 51 34 20 2D 20 4F 43 53 50 20 52 65 73 70 6F Q4 - OCSP Respo 0230: 6E 64 65 72 30 59 30 13 06 07 2A 86 48 CE 3D 02 nder0Y0...*.H.=. 0240: 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 00 04 17 ...*.H.=....B... 0250: 7B C8 D3 63 10 C5 2B 40 BD 7C 6B A4 E1 5F 2F BE ...c..+@..k.._/. 0260: BA F0 9F 49 BA 32 9F 60 56 F5 E0 06 0C 89 EC 8E ...I.2.`V....... 0270: 8E 16 18 90 87 EB 72 FD 5D F4 79 D3 6F 60 A8 2A ......r.].y.o`.* 0280: FC 69 C8 09 60 A3 91 3B D3 D6 B2 9E E3 99 34 A3 .i..`..;......4. 0290: 81 87 30 81 84 30 0F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 02A0: 01 05 04 02 05 00 30 0E 06 03 55 1D 0F 01 01 FF ......0...U..... 02B0: 04 04 03 02 07 80 30 13 06 03 55 1D 25 04 0C 30 ......0...U.%..0 02C0: 0A 06 08 2B 06 01 05 05 07 03 09 30 1D 06 03 55 ...+.......0...U 02D0: 1D 0E 04 16 04 14 55 BE 5B 96 18 50 6F 0C 30 4E ......U.[..Po.0N 02E0: 3F 45 25 EC A8 3D 12 5E 64 08 30 0C 06 03 55 1D ?E%..=.^d.0...U. 02F0: 13 01 01 FF 04 02 30 00 30 1F 06 03 55 1D 23 04 ......0.0...U.#. 0300: 18 30 16 80 14 5E C4 F2 F2 F8 D0 CF 0D 79 A3 4F .0...^.......y.O 0310: 69 21 F1 41 71 7D 53 65 60 30 0A 06 08 2A 86 48 i!.Aq.Se`0...*.H 0320: CE 3D 04 03 03 03 68 00 30 65 02 30 31 5A 69 38 .=....h.0e.01Zi8 0330: DB E4 7A 3D F6 82 51 8E 24 FB 62 D0 4D B8 7D C7 ..z=..Q.$.b.M... 0340: 8A E9 50 F0 CE FC 46 FC 7A B5 16 17 D0 16 76 81 ..P...F.z.....v. 0350: 7A 49 70 32 B1 D9 EE 05 6A 5E 08 0F 02 31 00 8E zIp2....j^...1.. 0360: A2 0C A0 2D CA 39 47 C3 2A 55 4F DE 1C D7 32 4E ...-.9G.*UO...2N 0370: D7 CC 44 69 69 B1 DE 37 64 73 C0 F5 D8 1E 43 25 ..Dii..7ds....C% 0380: ED 29 3A 65 DD 72 AA 1D FC 3E 3A FB 78 B3 C8 certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 55BE5B9618506F0C304E3F4525ECA83D125E6408 certpath: OCSP response produced at: Sat May 18 15:39:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 15:00:00 CST 2024 certpath: nextUpdate: Sun May 19 03:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 15:00:00 CST 2024 until Sun May 19 03:00:00 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:21 CST 2024 with allowed interval between Sat May 18 15:42:21 CST 2024 and Sat May 18 16:12:21 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert2 validation succeeded. certpath: Cert path validation succeeded. (PKIX validation algorithm) certpath: -------------------------------------------------------------- certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Sat May 18 15:57:23 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Sat May 18 15:57:23 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:23 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 DE 1D 43 C4 7A F5 F1 BC 86 .........C.z.... 0020: AB 36 43 7E 02 17 03 F8 9C CF 5C 04 14 31 0A 90 .6C.......\..1.. 0030: 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B .....DK.......O. 0040: 95 02 10 7F 1F 2C 88 FD 17 29 03 A3 20 2B 07 62 .....,...).. +.b 0050: D9 76 9C certpath: connecting to OCSP service at: http://ocsp.globalsign.com/roote46 certpath: OCSPResponse bytes... 0000: 30 82 04 F1 0A 01 00 A0 82 04 EA 30 82 04 E6 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 04 D7 30 82 .+.....0......0. 0020: 04 D3 30 81 9E A2 16 04 14 43 C5 86 1F 37 F3 52 ..0......C...7.R 0030: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 18 0F 32 *.I...U.4..=...2 0040: 30 32 34 30 35 31 38 30 35 32 31 35 30 5A 30 73 0240518052150Z0s 0050: 30 71 30 49 30 09 06 05 2B 0E 03 02 1A 05 00 04 0q0I0...+....... 0060: 14 DE 1D 43 C4 7A F5 F1 BC 86 AB 36 43 7E 02 17 ...C.z.....6C... 0070: 03 F8 9C CF 5C 04 14 31 0A 90 8F B6 C6 9D D2 44 ....\..1.......D 0080: 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 02 10 7F 1F 2C K.......O......, 0090: 88 FD 17 29 03 A3 20 2B 07 62 D9 76 9C 80 00 18 ...).. +.b.v.... 00A0: 0F 32 30 32 34 30 35 31 38 30 35 32 31 35 30 5A .20240518052150Z 00B0: A0 11 18 0F 32 30 32 34 30 35 32 32 30 35 32 31 ....202405220521 00C0: 34 39 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 49Z0...*.H...... 00D0: 05 00 03 82 01 01 00 54 94 E7 B6 5C 4F 91 23 48 .......T...\O.#H 00E0: E9 3F BC EB 4F 87 B3 EB 66 B3 9F 53 EA D4 3E 01 .?..O...f..S..>. 00F0: EB EC 60 77 2C A8 E7 8B 65 CC 4E 22 BE 1F 2E F1 ..`w,...e.N".... 0100: 15 F3 54 FD 4B 4E 61 AA E5 D7 B1 99 30 D4 42 D1 ..T.KNa.....0.B. 0110: 52 06 DA 22 D9 AB 20 6B 3E 4C DE B8 7B 63 27 63 R..".. k>L...c'c 0120: B3 E1 C5 0B C5 FC 18 8A 1C 6D 51 36 57 31 DD 34 .........mQ6W1.4 0130: A0 9D 2E 7D DB A0 73 B4 93 E3 8D C5 FF AE 70 42 ......s.......pB 0140: 61 91 B2 FE DE 8C 98 49 49 A3 5E 0E 01 72 4F A3 a......II.^..rO. 0150: 61 13 D5 F0 B5 B9 B3 AF FE 50 C9 FA CF AB 54 D2 a........P....T. 0160: 55 A1 30 D1 14 4C 23 95 88 1C 05 89 97 97 21 D7 U.0..L#.......!. 0170: 8A 03 99 56 EF 95 77 E1 CB 06 C8 1A 16 63 99 F3 ...V..w......c.. 0180: 74 40 7C 16 9F 7C D6 94 0F F5 82 76 EF A1 37 D3 t@.........v..7. 0190: C7 28 11 2F A2 19 9C 40 33 4C 93 67 45 AA 56 C2 .(./...@3L.gE.V. 01A0: B5 E6 26 70 5F DF 0D 44 6D CD CA 1B 50 2C 30 57 ..&p_..Dm...P,0W 01B0: 26 ED 11 1B F3 4F FE 7A 9D CE 15 D1 40 10 9E BE &....O.z....@... 01C0: A2 5B D7 E5 D4 3A 3E 05 BE 32 FA 5E 86 9A AE E3 .[...:>..2.^.... 01D0: D0 F9 3F D0 1B 00 08 A0 82 03 1A 30 82 03 16 30 ..?........0...0 01E0: 82 03 12 30 82 02 98 A0 03 02 01 02 02 11 00 80 ...0............ 01F0: 4E 02 61 EA D7 14 3F BB D7 C1 F9 97 3D FC 92 30 N.a...?.....=..0 0200: 0A 06 08 2A 86 48 CE 3D 04 03 03 30 46 31 0B 30 ...*.H.=...0F1.0 0210: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 0220: 55 04 0A 13 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0230: 6E 76 2D 73 61 31 1C 30 1A 06 03 55 04 03 13 13 nv-sa1.0...U.... 0240: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0250: 45 34 36 30 1E 17 0D 32 34 30 31 31 37 30 33 33 E460...240117033 0260: 31 34 39 5A 17 0D 32 34 30 38 31 35 30 30 30 30 149Z..2408150000 0270: 30 30 5A 30 5A 31 0B 30 09 06 03 55 04 06 13 02 00Z0Z1.0...U.... 0280: 42 45 31 19 30 17 06 03 55 04 0A 13 10 47 6C 6F BE1.0...U....Glo 0290: 62 61 6C 53 69 67 6E 20 6E 76 2D 73 61 31 30 30 balSign nv-sa100 02A0: 2E 06 03 55 04 03 13 27 47 6C 6F 62 61 6C 53 69 ...U...'GlobalSi 02B0: 67 6E 20 52 6F 6F 74 20 45 34 36 20 2D 20 4F 43 gn Root E46 - OC 02C0: 53 50 20 31 2E 32 20 32 30 32 34 30 35 30 37 30 SP 1.2 202405070 02D0: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H...... 02E0: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........ 02F0: 94 E6 7A 6D DF 9F 17 54 B6 D4 7F CC 95 DF AD 3E ..zm...T.......> 0300: AC 8E 43 2C EB C2 9E ED 9B 9B 1C E2 63 2F FE E3 ..C,........c/.. 0310: E1 76 D8 5E 29 55 D0 0B D3 DF 30 6A 1A A2 34 3E .v.^)U....0j..4> 0320: B6 97 9B F5 33 8F EF E2 8F 4D 41 95 C1 52 B8 19 ....3....MA..R.. 0330: 0D D9 2A F6 C6 BC 51 E0 69 82 8F 1B C0 7F D4 41 ..*...Q.i......A 0340: 66 D7 75 13 86 17 D6 7E 60 1B D1 61 FC E9 08 0B f.u.....`..a.... 0350: 85 22 30 EE FC 82 11 86 5F CB 30 A2 DC 7D B7 DB ."0....._.0..... 0360: 6F AB 96 DE 23 10 4D E2 98 2C 08 EE AE 7C 1E 23 o...#.M..,.....# 0370: 2F D4 B8 10 35 70 F7 97 AE 89 FA 9F 8E 07 E1 AD /...5p.......... 0380: FA A1 3A 94 09 2E 5C 66 23 44 36 60 A2 1A EA 9B ..:...\f#D6`.... 0390: 91 92 DA F6 07 C6 89 40 ED E2 C9 E0 71 F3 D6 91 .......@....q... 03A0: 2E 54 8C CC 21 0A 48 FF 06 5A 76 02 95 61 75 27 .T..!.H..Zv..au' 03B0: A4 B0 80 EC 69 0B 85 BE 35 02 AB C6 F5 27 76 A4 ....i...5....'v. 03C0: 76 E8 B1 BC F1 D4 49 61 89 AC 91 EB 1C 2E 23 09 v.....Ia......#. 03D0: C8 68 15 7D E5 64 BB BE 4E 02 4E 08 F5 44 AB 65 .h...d..N.N..D.e 03E0: A7 67 E2 40 D7 4A CB 32 3E A8 2B E6 19 BA A0 83 .g.@.J.2>.+..... 03F0: 02 03 01 00 01 A3 81 87 30 81 84 30 0E 06 03 55 ........0..0...U 0400: 1D 0F 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 ...........0...U 0410: 1D 25 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 .%..0...+....... 0420: 30 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 0...U.......0.0. 0430: 06 03 55 1D 0E 04 16 04 14 43 C5 86 1F 37 F3 52 ..U......C...7.R 0440: 2A CC 49 A4 15 FE 55 B4 34 DD 8D 3D EF 30 1F 06 *.I...U.4..=.0.. 0450: 03 55 1D 23 04 18 30 16 80 14 31 0A 90 8F B6 C6 .U.#..0...1..... 0460: 9D D2 44 4B 80 B5 A2 E6 1F B1 12 4F 1B 95 30 0F ..DK.......O..0. 0470: 06 09 2B 06 01 05 05 07 30 01 05 04 02 05 00 30 ..+.....0......0 0480: 0A 06 08 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 ...*.H.=....h.0e 0490: 02 31 00 93 B6 DE DA 9D 04 5D CE C7 AD CB D5 7C .1.......]...... 04A0: 60 6F 30 C1 B5 18 6B 6E 6D 21 28 65 E1 D1 3B 95 `o0...knm!(e..;. 04B0: C7 EA 60 92 07 F9 3B C6 4F DE 66 6A CF F2 B9 0B ..`...;.O.fj.... 04C0: 0A 96 B3 02 30 4B 14 DA 07 02 BE D7 1B 28 02 70 ....0K.......(.p 04D0: 4D 81 EE C4 B4 E3 D3 32 1A 53 44 2C B6 71 E2 9D M......2.SD,.q.. 04E0: 0C 45 A7 DF 5A 63 4E 87 D0 41 4A 88 62 CC 70 5A .E..ZcN..AJ.b.pZ 04F0: 77 9B 24 86 4C certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 43C5861F37F3522ACC49A415FE55B434DD8D3DEF certpath: OCSP response produced at: Sat May 18 13:21:50 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Sat May 18 13:21:50 CST 2024 certpath: nextUpdate: Wed May 22 13:21:49 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c) is: GOOD certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Root E46 - OCSP 1.2 20240507, O=GlobalSign nv-sa, C=BE Key: RSA ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withRSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: RSA ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 13:21:50 CST 2024 until Wed May 22 13:21:49 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:23 CST 2024 with allowed interval between Sat May 18 15:42:23 CST 2024 and Sat May 18 16:12:23 CST 2024 certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Sat May 18 15:57:23 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:23 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20 Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=revoked.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: OCSPRequest bytes... 0000: 30 51 30 4F 30 4D 30 4B 30 49 30 09 06 05 2B 0E 0Q0O0M0K0I0...+. 0010: 03 02 1A 05 00 04 14 06 C6 A3 12 8E E7 80 BF 64 ...............d 0020: AC 73 89 54 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 .s.T.....j...^.. 0030: F2 F8 D0 CF 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 .....y.Oi!.Aq.Se 0040: 60 02 10 01 E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 `....'u.T....... 0050: C7 3A 20 certpath: connecting to OCSP service at: http://ocsp.globalsign.com/ca/gsatlase46evtlsca2023q4 certpath: OCSPResponse bytes... 0000: 30 82 03 9E 0A 01 00 A0 82 03 97 30 82 03 93 06 0..........0.... 0010: 09 2B 06 01 05 05 07 30 01 01 04 82 03 84 30 82 .+.....0......0. 0020: 03 80 30 81 B1 A2 16 04 14 33 A9 AB 48 EC B6 BD ..0......3..H... 0030: 0E 42 CF EF CE FB A2 AE D1 7C C3 07 79 18 0F 32 .B..........y..2 0040: 30 32 34 30 35 31 38 30 37 33 39 30 30 5A 30 81 0240518073900Z0. 0050: 85 30 81 82 30 49 30 09 06 05 2B 0E 03 02 1A 05 .0..0I0...+..... 0060: 00 04 14 06 C6 A3 12 8E E7 80 BF 64 AC 73 89 54 ...........d.s.T 0070: 16 FA EB C8 B1 6A AA 04 14 5E C4 F2 F2 F8 D0 CF .....j...^...... 0080: 0D 79 A3 4F 69 21 F1 41 71 7D 53 65 60 02 10 01 .y.Oi!.Aq.Se`... 0090: E5 27 75 02 54 D2 E0 AD 1E F2 A3 92 C7 3A 20 A1 .'u.T........: . 00A0: 11 18 0F 32 30 32 33 31 30 32 33 31 32 32 39 30 ...2023102312290 00B0: 32 5A 18 0F 32 30 32 34 30 35 31 38 30 37 30 30 2Z..202405180700 00C0: 30 30 5A A0 11 18 0F 32 30 32 34 30 35 31 38 31 00Z....202405181 00D0: 39 30 30 30 30 5A 30 0A 06 08 2A 86 48 CE 3D 04 90000Z0...*.H.=. 00E0: 03 02 03 49 00 30 46 02 21 00 D7 5E 5A 01 31 E4 ...I.0F.!..^Z.1. 00F0: B7 59 E7 7A 1A 81 FB DA 01 E6 B7 80 33 62 43 4D .Y.z........3bCM 0100: 2D 3C F1 83 78 CE 09 E0 E0 D0 02 21 00 FE 93 B2 -<..x......!.... 0110: 4F D2 4D BC 5B 38 D3 62 51 8E 2F 7A 00 29 E2 6E O.M.[8.bQ./z.).n 0120: C8 6B 96 5A 89 75 F0 97 C7 0A 8C 51 B8 A0 82 02 .k.Z.u.....Q.... 0130: 71 30 82 02 6D 30 82 02 69 30 82 01 EF A0 03 02 q0..m0..i0...... 0140: 01 02 02 10 01 9A C4 75 15 74 A6 35 76 E5 EF F1 .......u.t.5v... 0150: E6 12 4A 04 30 0A 06 08 2A 86 48 CE 3D 04 03 03 ..J.0...*.H.=... 0160: 30 59 31 0B 30 09 06 03 55 04 06 13 02 42 45 31 0Y1.0...U....BE1 0170: 19 30 17 06 03 55 04 0A 13 10 47 6C 6F 62 61 6C .0...U....Global 0180: 53 69 67 6E 20 6E 76 2D 73 61 31 2F 30 2D 06 03 Sign nv-sa1/0-.. 0190: 55 04 03 13 26 47 6C 6F 62 61 6C 53 69 67 6E 20 U...&GlobalSign 01A0: 41 74 6C 61 73 20 45 34 36 20 45 56 20 54 4C 53 Atlas E46 EV TLS 01B0: 20 43 41 20 32 30 32 33 20 51 34 30 1E 17 0D 32 CA 2023 Q40...2 01C0: 34 30 35 31 38 30 35 32 35 35 36 5A 17 0D 32 34 40518052556Z..24 01D0: 30 35 32 35 30 35 32 35 35 36 5A 30 6A 31 0B 30 0525052556Z0j1.0 01E0: 09 06 03 55 04 06 13 02 42 45 31 19 30 17 06 03 ...U....BE1.0... 01F0: 55 04 0A 0C 10 47 6C 6F 62 61 6C 53 69 67 6E 20 U....GlobalSign 0200: 6E 76 2D 73 61 31 40 30 3E 06 03 55 04 03 0C 37 nv-sa1@0>..U...7 0210: 47 6C 6F 62 61 6C 53 69 67 6E 20 41 74 6C 61 73 GlobalSign Atlas 0220: 20 45 34 36 20 45 56 20 54 4C 53 20 43 41 20 32 E46 EV TLS CA 2 0230: 30 32 33 20 51 34 20 2D 20 4F 43 53 50 20 52 65 023 Q4 - OCSP Re 0240: 73 70 6F 6E 64 65 72 30 59 30 13 06 07 2A 86 48 sponder0Y0...*.H 0250: CE 3D 02 01 06 08 2A 86 48 CE 3D 03 01 07 03 42 .=....*.H.=....B 0260: 00 04 62 15 07 7C 96 DF 4F D5 E4 79 67 4B 54 18 ..b.....O..ygKT. 0270: 6D 72 9C 11 77 73 02 A0 62 A0 30 32 CA B3 8E 20 mr..ws..b.02... 0280: 23 1A 37 05 36 0B 16 97 C5 58 63 C7 38 85 CE 75 #.7.6....Xc.8..u 0290: D0 F6 E4 6A 52 9D 62 B2 CC BC 93 F8 86 36 8A 93 ...jR.b......6.. 02A0: BE B8 A3 81 87 30 81 84 30 0F 06 09 2B 06 01 05 .....0..0...+... 02B0: 05 07 30 01 05 04 02 05 00 30 0E 06 03 55 1D 0F ..0......0...U.. 02C0: 01 01 FF 04 04 03 02 07 80 30 13 06 03 55 1D 25 .........0...U.% 02D0: 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 30 1D ..0...+.......0. 02E0: 06 03 55 1D 0E 04 16 04 14 33 A9 AB 48 EC B6 BD ..U......3..H... 02F0: 0E 42 CF EF CE FB A2 AE D1 7C C3 07 79 30 0C 06 .B..........y0.. 0300: 03 55 1D 13 01 01 FF 04 02 30 00 30 1F 06 03 55 .U.......0.0...U 0310: 1D 23 04 18 30 16 80 14 5E C4 F2 F2 F8 D0 CF 0D .#..0...^....... 0320: 79 A3 4F 69 21 F1 41 71 7D 53 65 60 30 0A 06 08 y.Oi!.Aq.Se`0... 0330: 2A 86 48 CE 3D 04 03 03 03 68 00 30 65 02 31 00 *.H.=....h.0e.1. 0340: EC CA 11 E7 1E 45 E6 AB 29 6D 47 01 04 B5 8A 8A .....E..)mG..... 0350: 38 D9 1E 4A 03 01 C7 CA 81 A3 AD F6 4E 0A 21 84 8..J........N.!. 0360: 6D 6C C2 3C D0 80 D8 E2 A7 C6 2B BC 17 93 07 D6 ml.<......+..... 0370: 02 30 3D 7E 6E DD DC D0 57 85 13 44 A6 E7 58 D4 .0=.n...W..D..X. 0380: CE ED BD 03 9B 2C 0F BD 9A EE DE C0 2D A5 F2 B5 .....,......-... 0390: 03 37 B4 62 17 6E 4E 99 D7 BA 6A 22 93 61 71 D0 .7.b.nN...j".aq. 03A0: D5 D2 certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 33A9AB48ECB6BD0E42CFEFCEFBA2AED17CC30779 certpath: OCSP response produced at: Sat May 18 15:39:00 CST 2024 certpath: OCSP number of SingleResponses: 1 certpath: Revocation time: Mon Oct 23 20:29:02 CST 2023 certpath: Revocation reason: UNSPECIFIED certpath: thisUpdate: Sat May 18 15:00:00 CST 2024 certpath: nextUpdate: Sun May 19 03:00:00 CST 2024 certpath: OCSP response cert #1: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE certpath: Status of certificate (with serial number 01:e5:27:75:02:54:d2:e0:ad:1e:f2:a3:92:c7:3a:20) is: REVOKED certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4 - OCSP Responder, O=GlobalSign nv-sa, C=BE Key: EC ] certpath: Responder's certificate includes the extension id-pkix-ocsp-nocheck. certpath: OCSP response is signed by an Authorized Responder certpath: Constraints.permits(): SHA256withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Sat May 18 15:00:00 CST 2024 until Sun May 19 03:00:00 CST 2024 certpath: Checking validity of OCSP response on Sat May 18 15:57:23 CST 2024 with allowed interval between Sat May 18 15:42:23 CST 2024 and Sat May 18 16:12:23 CST 2024 certpath: X509CertSelector.match(Serial number: 00:9b:7e:06:49:a3:3e:62:b9:d5:ee:90:48:71:29:ef:57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 01:00:20 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match STATUS:Passed. rerun: cd /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/scratch && \ DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/995/bus \ DISPLAY=:7 \ HOME=/home/yansendao \ LANG=en_US.UTF-8 \ PATH=/bin:/usr/bin:/usr/sbin \ XDG_RUNTIME_DIR=/run/user/995 \ XDG_SESSION_ID=282 \ CLASSPATH=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib:/home/yansendao/git/jdk/test/lib:/home/yansendao/software/jdk/jtreg-7/lib/javatest.jar:/home/yansendao/software/jdk/jtreg-7/lib/jtreg.jar \ /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/java \ -Dtest.vm.opts='-ea -esa' \ -Dtest.tool.vm.opts='-J-ea -J-esa' \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dcompile.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dtest.timeout.factor=4.0 \ -Dtest.root=/home/yansendao/git/jdk/test/jdk \ -Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -Dtest.file=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -Dtest.src=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -Dtest.src.path=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -Dtest.classes=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -Dtest.class.path=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -ea \ -esa \ -Djava.security.debug=certpath,ocsp \ -Dcom.sun.security.ocsp.useget=false \ com.sun.javatest.regtest.agent.MainWrapper /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d/main.1.jta globalsigne46 OCSP ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.0 seconds messages: command: build CAInterop reason: Named class compiled on demand started: Sat May 18 15:57:23 CST 2024 finished: Sat May 18 15:57:23 CST 2024 elapsed time (seconds): 0.0 ACTION: main -- Error. Program `/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/java' timed out (timeout set to 480000ms, elapsed time including timeout handling was 480707ms). REASON: User specified action: run main/othervm -Djava.security.debug=certpath CAInterop globalsigne46 CRL TIME: 480.735 seconds messages: command: main -Djava.security.debug=certpath CAInterop globalsigne46 CRL reason: User specified action: run main/othervm -Djava.security.debug=certpath CAInterop globalsigne46 CRL started: Sat May 18 15:57:23 CST 2024 Mode: othervm [/othervm specified] Timeout information: Running jstack on process 2602464 2024-05-18 16:05:23 Full thread dump OpenJDK 64-Bit Server VM (23 mixed mode, sharing): Threads class SMR info: _java_thread_list=0x00007efee4001f90, length=12, elements={ 0x00007effa402acc0, 0x00007effa41851b0, 0x00007effa4186800, 0x00007effa41885b0, 0x00007effa4189bf0, 0x00007effa418b190, 0x00007effa418cc90, 0x00007effa4196390, 0x00007effa41a57e0, 0x00007effa41a9df0, 0x00007effa4202f10, 0x00007efee4000f40 } "main" #1 [2602482] prio=5 os_prio=0 cpu=62.26ms elapsed=480.66s tid=0x00007effa402acc0 nid=2602482 in Object.wait() [0x00007effa863e000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait0(java.base@23/Native Method) - waiting on <0x000000011b089d90> (a java.lang.Thread) at java.lang.Object.wait(java.base@23/Object.java:374) at java.lang.Thread.join(java.base@23/Thread.java:2017) - locked <0x000000011b089d90> (a java.lang.Thread) at java.lang.Thread.join(java.base@23/Thread.java:2093) at com.sun.javatest.regtest.agent.MainWrapper.main(MainWrapper.java:85) "Reference Handler" #9 [2602596] daemon prio=10 os_prio=0 cpu=0.29ms elapsed=480.60s tid=0x00007effa41851b0 nid=2602596 waiting on condition [0x00007eff64207000] java.lang.Thread.State: RUNNABLE at java.lang.ref.Reference.waitForReferencePendingList(java.base@23/Native Method) at java.lang.ref.Reference.processPendingReferences(java.base@23/Reference.java:246) at java.lang.ref.Reference$ReferenceHandler.run(java.base@23/Reference.java:208) "Finalizer" #10 [2602609] daemon prio=8 os_prio=0 cpu=0.15ms elapsed=480.59s tid=0x00007effa4186800 nid=2602609 in Object.wait() [0x00007eff64106000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait0(java.base@23/Native Method) - waiting on <0x000000011b001590> (a java.lang.ref.NativeReferenceQueue$Lock) at java.lang.Object.wait(java.base@23/Object.java:374) at java.lang.Object.wait(java.base@23/Object.java:348) at java.lang.ref.NativeReferenceQueue.await(java.base@23/NativeReferenceQueue.java:48) at java.lang.ref.ReferenceQueue.remove0(java.base@23/ReferenceQueue.java:158) at java.lang.ref.NativeReferenceQueue.remove(java.base@23/NativeReferenceQueue.java:89) - locked <0x000000011b001590> (a java.lang.ref.NativeReferenceQueue$Lock) at java.lang.ref.Finalizer$FinalizerThread.run(java.base@23/Finalizer.java:173) "Signal Dispatcher" #11 [2602616] daemon prio=9 os_prio=0 cpu=0.54ms elapsed=480.57s tid=0x00007effa41885b0 nid=2602616 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Service Thread" #12 [2602617] daemon prio=9 os_prio=0 cpu=6.74ms elapsed=480.57s tid=0x00007effa4189bf0 nid=2602617 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Monitor Deflation Thread" #13 [2602618] daemon prio=9 os_prio=0 cpu=23.27ms elapsed=480.57s tid=0x00007effa418b190 nid=2602618 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "C2 CompilerThread0" #14 [2602619] daemon prio=9 os_prio=0 cpu=620.66ms elapsed=480.57s tid=0x00007effa418cc90 nid=2602619 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "C1 CompilerThread0" #24 [2602620] daemon prio=9 os_prio=0 cpu=57.68ms elapsed=480.56s tid=0x00007effa4196390 nid=2602620 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "Notification Thread" #29 [2602655] daemon prio=9 os_prio=0 cpu=0.06ms elapsed=480.52s tid=0x00007effa41a57e0 nid=2602655 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Common-Cleaner" #30 [2602657] daemon prio=8 os_prio=0 cpu=1.35ms elapsed=480.51s tid=0x00007effa41a9df0 nid=2602657 waiting on condition [0x00007eff558e5000] java.lang.Thread.State: TIMED_WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@23/Native Method) - parking to wait for <0x000000011b015840> (a java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject) at java.util.concurrent.locks.LockSupport.parkNanos(java.base@23/LockSupport.java:269) at java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(java.base@23/AbstractQueuedSynchronizer.java:1852) at java.lang.ref.ReferenceQueue.await(java.base@23/ReferenceQueue.java:71) at java.lang.ref.ReferenceQueue.remove0(java.base@23/ReferenceQueue.java:143) at java.lang.ref.ReferenceQueue.remove(java.base@23/ReferenceQueue.java:218) at jdk.internal.ref.CleanerImpl.run(java.base@23/CleanerImpl.java:140) at java.lang.Thread.runWith(java.base@23/Thread.java:1588) at java.lang.Thread.run(java.base@23/Thread.java:1575) at jdk.internal.misc.InnocuousThread.run(java.base@23/InnocuousThread.java:186) "MainThread" #31 [2602691] prio=5 os_prio=0 cpu=563.21ms elapsed=480.47s tid=0x00007effa4202f10 nid=2602691 runnable [0x00007eff553d5000] java.lang.Thread.State: RUNNABLE at sun.nio.ch.SocketDispatcher.read0(java.base@23/Native Method) at sun.nio.ch.SocketDispatcher.read(java.base@23/SocketDispatcher.java:47) at sun.nio.ch.NioSocketImpl.tryRead(java.base@23/NioSocketImpl.java:256) at sun.nio.ch.NioSocketImpl.implRead(java.base@23/NioSocketImpl.java:307) at sun.nio.ch.NioSocketImpl.read(java.base@23/NioSocketImpl.java:346) at sun.nio.ch.NioSocketImpl$1.read(java.base@23/NioSocketImpl.java:796) at java.net.Socket$SocketInputStream.implRead(java.base@23/Socket.java:1116) at java.net.Socket$SocketInputStream.read(java.base@23/Socket.java:1103) at sun.security.ssl.SSLSocketInputRecord.read(java.base@23/SSLSocketInputRecord.java:489) at sun.security.ssl.SSLSocketInputRecord.readHeader(java.base@23/SSLSocketInputRecord.java:483) at sun.security.ssl.SSLSocketInputRecord.decode(java.base@23/SSLSocketInputRecord.java:160) at sun.security.ssl.SSLTransport.decode(java.base@23/SSLTransport.java:111) at sun.security.ssl.SSLSocketImpl.decode(java.base@23/SSLSocketImpl.java:1507) at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(java.base@23/SSLSocketImpl.java:1422) at sun.security.ssl.SSLSocketImpl.startHandshake(java.base@23/SSLSocketImpl.java:455) at sun.security.ssl.SSLSocketImpl.startHandshake(java.base@23/SSLSocketImpl.java:426) at sun.net.www.protocol.https.HttpsClient.afterConnect(java.base@23/HttpsClient.java:586) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(java.base@23/AbstractDelegateHttpsURLConnection.java:187) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(java.base@23/HttpsURLConnectionImpl.java:141) at ValidatePathWithURL.validateDomainCertChain(ValidatePathWithURL.java:142) at ValidatePathWithURL.validateDomain(ValidatePathWithURL.java:128) at CAInterop.validate(CAInterop.java:784) at CAInterop.main(CAInterop.java:726) at java.lang.invoke.LambdaForm$DMH/0x00007eff07002000.invokeStatic(java.base@23/LambdaForm$DMH) at java.lang.invoke.LambdaForm$MH/0x00007eff07003400.invoke(java.base@23/LambdaForm$MH) at java.lang.invoke.Invokers$Holder.invokeExact_MT(java.base@23/Invokers$Holder) at jdk.internal.reflect.DirectMethodHandleAccessor.invokeImpl(java.base@23/DirectMethodHandleAccessor.java:154) at jdk.internal.reflect.DirectMethodHandleAccessor.invoke(java.base@23/DirectMethodHandleAccessor.java:103) at java.lang.reflect.Method.invoke(java.base@23/Method.java:580) at com.sun.javatest.regtest.agent.MainWrapper$MainTask.run(MainWrapper.java:138) at java.lang.Thread.runWith(java.base@23/Thread.java:1588) at java.lang.Thread.run(java.base@23/Thread.java:1575) "Attach Listener" #33 [2854921] daemon prio=9 os_prio=0 cpu=0.17ms elapsed=0.10s tid=0x00007efee4000f40 nid=2854921 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "VM Thread" os_prio=0 cpu=0.83ms elapsed=480.61s tid=0x00007effa4177ac0 nid=2602572 runnable "VM Periodic Task Thread" os_prio=0 cpu=134.50ms elapsed=480.62s tid=0x00007effa415cc60 nid=2602562 waiting on condition "G1 Service" os_prio=0 cpu=9.87ms elapsed=480.63s tid=0x00007effa41435d0 nid=2602534 runnable "G1 Refine#0" os_prio=0 cpu=0.07ms elapsed=480.63s tid=0x00007effa4142610 nid=2602531 runnable "G1 Conc#0" os_prio=0 cpu=0.04ms elapsed=480.64s tid=0x00007effa406f5e0 nid=2602517 runnable "G1 Main Marker" os_prio=0 cpu=0.07ms elapsed=480.66s tid=0x00007effa406e600 nid=2602492 runnable "GC Thread#0" os_prio=0 cpu=0.08ms elapsed=480.66s tid=0x00007effa405a810 nid=2602486 runnable JNI global refs: 27, weak refs: 0 --- Timeout information end. finished: Sat May 18 16:05:23 CST 2024 elapsed time (seconds): 480.735 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== http.proxyHost :null http.proxyPort :null https.proxyHost :null https.proxyPort :null https.socksProxyHost :null https.socksProxyPort :null jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, SHA1 usage SignedJAR & denyAfter 2019-01-01 com.sun.security.enableCRLDP :true ocsp.enable :false ===================================================== ===== Validate https://valid.e46.roots.globalsign.com===== Timeout signalled after 480 seconds STDERR: certpath: Constraints: 3DES_EDE_CBC certpath: Constraints: anon certpath: Constraints: DES certpath: Constraints: DH keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DTLSv1.0 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: ECDH certpath: Constraints: MD5withRSA certpath: Constraints: NULL certpath: Constraints: RC4 certpath: Constraints: SSLv3 certpath: Constraints: TLSv1 certpath: Constraints: TLSv1.1 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: PKIXCertPathValidator.engineValidate()... certpath: X509CertSelector.match(Serial number: 0c:be Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW) certpath: X509CertSelector.match: subject DNs don't match certpath: X509CertSelector.match(Serial number: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: SHA1 usage SignedJAR & denyAfter 2019-01-01 certpath: Constraints usage length is 1 certpath: Constraints set to denyAfter certpath: DenyAfterConstraint read in as: year 2019, month = 1, day = 1 certpath: DenyAfterConstraint date set to: 2019-01-01 certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): EC, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC Date: Sat May 18 15:57:26 CST 2024 ] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Cert Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Key: EC Date: Sat May 18 15:57:26 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:26 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE; subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; serial#: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: RevocationChecker.checkCRLs() ---checking revocation status ... certpath: RevocationChecker.checkCRLs() possible crls.size() = 0 certpath: RevocationChecker.checkCRLs() approved crls.size() = 0 certpath: DistributionPointFetcher.getCRLs: Checking CRLDPs for CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Trying to fetch CRL from DP http://crl.globalsign.com/roote46.crl certpath: com.sun.security.crl.timeout set to 15000 milliseconds certpath: com.sun.security.crl.readtimeout set to 15000 milliseconds certpath: com.sun.security.cert.timeout set to 15000 milliseconds certpath: com.sun.security.cert.readtimeout set to 15000 milliseconds certpath: CertStore URI:http://crl.globalsign.com/roote46.crl certpath: Downloading new CRL... certpath: DistributionPointFetcher.verifyCRL: checking revocation status for SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c Subject: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Returning 1 CRLs certpath: RevocationChecker.checkApprovedCRLs() starting the final sweep... certpath: RevocationChecker.checkApprovedCRLs() cert SN: 7f:1f:2c:88:fd:17:29:03:a3:20:2b:07:62:d9:76:9c certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Cert Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE Cert Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Key: EC Date: Sat May 18 15:57:26 CST 2024 ] certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.4146.10.1.1 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents() found parent: 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (1) 1.3.6.1.4.1.4146.10.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.10.1.1 (2) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (1) 1.3.6.1.4.1.4146.1.1 CRIT: false EP: 1.3.6.1.4.1.4146.1.1 (2) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (1) 2.23.140.1.1 CRIT: false EP: 2.23.140.1.1 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Sat May 18 15:57:26 CST 2024... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE; subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB; serial#: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: RevocationChecker.checkCRLs() ---checking revocation status ... certpath: RevocationChecker.checkCRLs() possible crls.size() = 0 certpath: RevocationChecker.checkCRLs() approved crls.size() = 0 certpath: DistributionPointFetcher.getCRLs: Checking CRLDPs for SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB certpath: Trying to fetch CRL from DP http://crl.globalsign.com/ca/gsatlase46evtlsca2023q4.crl certpath: CertStore URI:http://crl.globalsign.com/ca/gsatlase46evtlsca2023q4.crl certpath: Downloading new CRL... certpath: DistributionPointFetcher.verifyCRL: checking revocation status for SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a Subject: SERIALNUMBER=04705639, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, CN=valid.e46.roots.globalsign.com, O=GMO GlobalSign LTD, STREET="Springfield House, Sandling Road", OID.2.5.4.17=ME14 2LP, L=Maidstone, ST=Kent, C=GB Issuer: CN=GlobalSign Atlas E46 EV TLS CA 2023 Q4, O=GlobalSign nv-sa, C=BE certpath: Constraints.permits(): SHA384withECDSA, [ Variant: tls server Anchor: [ Trusted CA cert: [ [ Version: V3 Subject: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 384 bits public x coord: 24019432300189087672941319075455521479694611637571214575722013324283564684998168122961977598895087693950505975722624 public y coord: 6742149443231861379623016579368542169821401513454099743947791365305396240395805831645430329030075773173056934067232 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Wed Mar 20 08:00:00 CST 2019, To: Tue Mar 20 08:00:00 CST 2046] Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE SerialNumber: 11:d2:bb:ba:33:6e:d4:bc:e6:24:68:c5:0d:84:1d:98:e8:43 Certificate Extensions: 3 [1]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen: no limit ] [2]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 31 0A 90 8F B6 C6 9D D2 44 4B 80 B5 A2 E6 1F B1 1.......DK...... 0010: 12 4F 1B 95 .O.. ] ] ] Algorithm: [SHA384withECDSA] Signature: 0000: 30 65 02 31 00 DF 54 90 ED 9B EF 8B 94 02 93 17 0e.1..T......... 0010: 82 99 BE B3 9E 2C F6 0B 91 8C 9F 4A 14 B1 F6 64 .....,.....J...d 0020: BC BB 68 51 13 0C 03 F7 15 8B 84 60 B9 8B FF 52 ..hQ.......`...R 0030: 8E E7 8C BC 1C 02 30 3C F9 11 D4 8C 4E C0 C1 61 ......0<....N..a 0040: C2 15 4C AA AB 1D 0B 31 5F 3B 1C E2 00 97 44 31 ..L....1_;....D1 0050: E6 FE 73 96 2F DA 96 D3 FE 08 07 B3 34 89 BC 05 ..s./.......4... 0060: 9F F7 1E 86 EE 8B 70 ......p ] Key: EC ] certpath: Returning 1 CRLs certpath: RevocationChecker.checkApprovedCRLs() starting the final sweep... certpath: RevocationChecker.checkApprovedCRLs() cert SN: 01:c7:71:fd:da:a6:99:85:e4:b6:61:75:f2:65:c5:8a certpath: -checker7 validation succeeded certpath: -Using checker8 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC certpath: -checker8 validation succeeded certpath: cert2 validation succeeded. certpath: Cert path validation succeeded. (PKIX validation algorithm) certpath: -------------------------------------------------------------- certpath: KeySizeConstraints.permits(): EC certpath: KeySizeConstraints.permits(): EC rerun: cd /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/scratch && \ DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/995/bus \ DISPLAY=:7 \ HOME=/home/yansendao \ LANG=en_US.UTF-8 \ PATH=/bin:/usr/bin:/usr/sbin \ XDG_RUNTIME_DIR=/run/user/995 \ XDG_SESSION_ID=282 \ CLASSPATH=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib:/home/yansendao/git/jdk/test/lib:/home/yansendao/software/jdk/jtreg-7/lib/javatest.jar:/home/yansendao/software/jdk/jtreg-7/lib/jtreg.jar \ /home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/java \ -Dtest.vm.opts='-ea -esa' \ -Dtest.tool.vm.opts='-J-ea -J-esa' \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dcompile.jdk=/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk \ -Dtest.timeout.factor=4.0 \ -Dtest.root=/home/yansendao/git/jdk/test/jdk \ -Dtest.name=security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigne46 \ -Dtest.file=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java \ -Dtest.src=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification \ -Dtest.src.path=/home/yansendao/git/jdk/test/jdk/security/infra/java/security/cert/CertPathValidator/certification:/home/yansendao/git/jdk/test/lib \ -Dtest.classes=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d \ -Dtest.class.path=/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d:/home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/classes/test/lib \ -ea \ -esa \ -Djava.security.debug=certpath \ com.sun.javatest.regtest.agent.MainWrapper /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320/security/infra/java/security/cert/CertPathValidator/certification/CAInterop_globalsigne46.d/main.2.jta globalsigne46 CRL TEST RESULT: Error. Program `/home/yansendao/git/jdk/build/linux-x86_64-server-release/images/jdk/bin/java' timed out (timeout set to 480000ms, elapsed time including timeout handling was 480707ms). -------------------------------------------------- Test results: error: 1 Results written to /home/yansendao/git/jdk/tmp-jtreg-CAInterop.java_globalsigne46/index-1320 Error: Some tests failed or other problems occurred.