#Test Results (version 2) #Mon Jun 13 19:25:35 GMT 2016 #checksum:7ddcfb7fbb343b01 #-----testdescription----- $file=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/CipherSuite.java $root=/scratch/jenkins/workspace/9-dev/jdk/test keywords=bug8043758 intermittent othervm modules=java.base/sun.security.util run=USER_SPECIFIED build DTLSOverDatagram\nUSER_SPECIFIED main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA\nUSER_SPECIFIED main/othervm CipherSuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_RSA_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256\nUSER_SPECIFIED main/othervm CipherSuite TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256\n source=CipherSuite.java title=Datagram Transport Layer Security (DTLS) #-----environment----- #-----testresult----- description=file\:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/CipherSuite.java elapsed=619987 0\:10\:19.987 end=Mon Jun 13 19\:25\:35 GMT 2016 environment=regtest execStatus=Error. Program `/scratch/jenkins/workspace/9-dev/jdk/bin/java' timed out (timeout set to 600000ms, elapsed time was 601068ms). hostname=scaaa980.us.oracle.com javatestOS=Mac OS X 10.10.5 (x86_64) javatestVersion=4.4 jtregVersion=jtreg 4.2 fcs b02 modules=java.base/sun.security.util script=com.sun.javatest.regtest.RegressionScript sections=script_messages build compile build compile main build main build main build main build main build main build main build main start=Mon Jun 13 19\:15\:15 GMT 2016 test=javax/net/ssl/DTLS/CipherSuite.java testJDK=/scratch/jenkins/workspace/9-dev/jdk user.name=mach5-one work=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS #section:script_messages ----------messages:(5/208)---------- JDK under test: /scratch/jenkins/workspace/9-dev/jdk java version "9-ea" Java(TM) SE Runtime Environment (build 9-ea+123-mach5-b651) Java HotSpot(TM) 64-Bit Server VM (build 9-ea+123-mach5-b651, mixed mode) #section:build ----------messages:(5/165)---------- command: build DTLSOverDatagram reason: User specified action: run build DTLSOverDatagram Test directory: compile: DTLSOverDatagram elapsed time (seconds): 0.079 result: Passed. Build successful #section:compile ----------messages:(4/194)---------- command: compile /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java reason: .class file out of date or does not exist Mode: agentvm elapsed time (seconds): 0.078 ----------configuration:(10/684)---------- Boot Layer (javac execution environment) class path: /scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar /scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar patch: java.base /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/patches/java.base javac compilation environment add exports: java.base/sun.security.util ALL-UNNAMED class path: /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS ----------rerun:(24/1769)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ /scratch/jenkins/workspace/9-dev/jdk/bin/javac \\ -J-ea \\ -J-esa \\ -J-Xmx512m \\ -J-Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -J-Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -J-Dtest.vm.opts='-ea -esa -Xmx512m' \\ -J-Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -J-Dtest.compiler.opts= \\ -J-Dtest.java.opts= \\ -J-Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -J-Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -J-Dtest.timeout.factor=5.0 \\ -J-Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -d /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -sourcepath /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -classpath /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java ----------direct:(16/1278)---------- /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java:44: warning: HexDumpEncoder is internal proprietary API and may be removed in a future release import sun.security.util.HexDumpEncoder; ^ /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java:651: warning: HexDumpEncoder is internal proprietary API and may be removed in a future release HexDumpEncoder dump = new HexDumpEncoder(); ^ /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java:651: warning: HexDumpEncoder is internal proprietary API and may be removed in a future release HexDumpEncoder dump = new HexDumpEncoder(); ^ /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java:667: warning: HexDumpEncoder is internal proprietary API and may be removed in a future release HexDumpEncoder dump = new HexDumpEncoder(); ^ /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/DTLSOverDatagram.java:667: warning: HexDumpEncoder is internal proprietary API and may be removed in a future release HexDumpEncoder dump = new HexDumpEncoder(); ^ 5 warnings result: Passed. Compilation successful #section:build ----------messages:(5/135)---------- command: build CipherSuite reason: Named class compiled on demand Test directory: compile: CipherSuite elapsed time (seconds): 0.033 result: Passed. Build successful #section:compile ----------messages:(4/189)---------- command: compile /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/CipherSuite.java reason: .class file out of date or does not exist Mode: agentvm elapsed time (seconds): 0.033 ----------configuration:(10/684)---------- Boot Layer (javac execution environment) class path: /scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar /scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar patch: java.base /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/patches/java.base javac compilation environment add exports: java.base/sun.security.util ALL-UNNAMED class path: /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS ----------rerun:(24/1764)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ /scratch/jenkins/workspace/9-dev/jdk/bin/javac \\ -J-ea \\ -J-esa \\ -J-Xmx512m \\ -J-Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -J-Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -J-Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -J-Dtest.vm.opts='-ea -esa -Xmx512m' \\ -J-Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -J-Dtest.compiler.opts= \\ -J-Dtest.java.opts= \\ -J-Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -J-Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -J-Dtest.timeout.factor=5.0 \\ -J-Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -d /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -sourcepath /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -classpath /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS /scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS/CipherSuite.java result: Passed. Compilation successful #section:main ----------messages:(4/210)---------- command: main CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA reason: User specified action: run main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA Mode: othervm [/othervm specified] elapsed time (seconds): 2.529 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(820/44643)---------- *** found key for : dummydsa *** found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {EA EE 22 43 51 EB 56 7F 0F 16 A6 7D 8F 20 98 A2 F2 1C 54 33 DB BC 29 A1 F3 39 AE F5 E8 31 26 14} Session ID: {} cookie: { } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 122 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 122 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {EA EE 22 43 51 EB 56 7F 0F 16 A6 7D 8F 20 98 A2 F2 1C 54 33 DB BC 29 A1 F3 39 AE F5 E8 31 26 14} Session ID: {} cookie: { } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 121, 10, 246, 220, 213, 214, 77, 8, 20, 94, 145, 95, 0, 53, 157, 63, 27, 56, 245, 190, 68, 93, 89, 106, 31, 162, 77, 153, 239, 38, 140, 37 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 121, 10, 246, 220, 213, 214, 77, 8, 20, 94, 145, 95, 0, 53, 157, 63, 27, 56, 245, 190, 68, 93, 89, 106, 31, 162, 77, 153, 239, 38, 140, 37 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {EA EE 22 43 51 EB 56 7F 0F 16 A6 7D 8F 20 98 A2 F2 1C 54 33 DB BC 29 A1 F3 39 AE F5 E8 31 26 14} Session ID: {} cookie: { 121, 10, 246, 220, 213, 214, 77, 8, 20, 94, 145, 95, 0, 53, 157, 63, 27, 56, 245, 190, 68, 93, 89, 106, 31, 162, 77, 153, 239, 38, 140, 37 } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 154 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 154 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {EA EE 22 43 51 EB 56 7F 0F 16 A6 7D 8F 20 98 A2 F2 1C 54 33 DB BC 29 A1 F3 39 AE F5 E8 31 26 14} Session ID: {} cookie: { 121, 10, 246, 220, 213, 214, 77, 8, 20, 94, 145, 95, 0, 53, 157, 63, 27, 56, 245, 190, 68, 93, 89, 106, 31, 162, 77, 153, 239, 38, 140, 37 } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {47 4A 23 B6 3D DB 53 B0 D3 39 A8 D7 98 67 6F F0 3B FB 64 34 20 98 E5 C0 BA 5D 99 44 42 03 CD 9F} Session ID: {41, 20, 105, 245, 230, 53, 156, 118, 220, 148, 152, 212, 27, 103, 150, 185, 217, 196, 173, 153, 11, 80, 64, 175, 219, 59, 163, 176, 129, 232, 211, 129} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {47 4A 23 B6 3D DB 53 B0 D3 39 A8 D7 98 67 6F F0 3B FB 64 34 20 98 E5 C0 BA 5D 99 44 42 03 CD 9F} Session ID: {41, 20, 105, 245, 230, 53, 156, 118, 220, 148, 152, 212, 27, 103, 150, 185, 217, 196, 173, 153, 11, 80, 64, 175, 219, 59, 163, 176, 129, 232, 211, 129} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, DTLSv1.2 update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: FE FD 1D 33 33 A4 9B 45 7D 02 2A 58 C5 E4 8B 0C ...33..E..*X.... 0010: 53 CF A5 42 79 E9 80 BC 29 9D 0B 49 A7 B7 0E 72 S..By...)..I...r 0020: A9 E1 43 6C EB E7 20 CA 75 2F 8C 8E B5 00 21 C8 ..Cl.. .u/....!. CONNECTION KEYGEN: Client Nonce: 0000: EA EE 22 43 51 EB 56 7F 0F 16 A6 7D 8F 20 98 A2 .."CQ.V...... .. 0010: F2 1C 54 33 DB BC 29 A1 F3 39 AE F5 E8 31 26 14 ..T3..)..9...1&. Server Nonce: 0000: 47 4A 23 B6 3D DB 53 B0 D3 39 A8 D7 98 67 6F F0 GJ#.=.S..9...go. 0010: 3B FB 64 34 20 98 E5 C0 BA 5D 99 44 42 03 CD 9F ;.d4 ....].DB... Master Secret: 0000: E5 31 B4 50 DB 8B 30 A9 9E 8B F5 9D 25 2A 33 40 .1.P..0.....%*3@ 0010: 1A 83 F2 09 7B 1C D5 1B FE BF 17 F0 81 3C 42 CC ..............E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 No available cipher suite for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 184 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 120, 147, 252, 185, 135, 115, 92, 50, 254, 194, 125, 196, 237, 27, 195, 216, 223, 52, 164, 71, 209, 183, 31, 140, 227, 40, 162, 98, 69, 58, 43, 156 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 120, 147, 252, 185, 135, 115, 92, 50, 254, 194, 125, 196, 237, 27, 195, 216, 223, 52, 164, 71, 209, 183, 31, 140, 227, 40, 162, 98, 69, 58, 43, 156 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B} Session ID: {} cookie: { 120, 147, 252, 185, 135, 115, 92, 50, 254, 194, 125, 196, 237, 27, 195, 216, 223, 52, 164, 71, 209, 183, 31, 140, 227, 40, 162, 98, 69, 58, 43, 156 } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 216 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 216 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B} Session ID: {} cookie: { 120, 147, 252, 185, 135, 115, 92, 50, 254, 194, 125, 196, 237, 27, 195, 216, 223, 52, 164, 71, 209, 183, 31, 140, 227, 40, 162, 98, 69, 58, 43, 156 } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {01 0A 19 F8 94 D8 BC 28 90 00 45 B1 92 4A B0 38 F7 68 9D 25 90 34 14 11 66 06 3D 81 74 B5 6C D1} Session ID: {44, 216, 55, 2, 195, 240, 82, 241, 203, 228, 167, 157, 208, 42, 16, 171, 116, 141, 63, 3, 65, 254, 22, 245, 62, 39, 254, 72, 173, 46, 158, 208} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 6460960264984308049776719735255439479291874671290860432100302289411168760663 public y coord: 78000122006074833600208865908240959498522373389179626727853096442790045328839 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 341 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 341 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {01 0A 19 F8 94 D8 BC 28 90 00 45 B1 92 4A B0 38 F7 68 9D 25 90 34 14 11 66 06 3D 81 74 B5 6C D1} Session ID: {44, 216, 55, 2, 195, 240, 82, 241, 203, 228, 167, 157, 208, 42, 16, 171, 116, 141, 63, 3, 65, 254, 22, 245, 62, 39, 254, 72, 173, 46, 158, 208} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] ** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 6460960264984308049776719735255439479291874671290860432100302289411168760663 public y coord: 78000122006074833600208865908240959498522373389179626727853096442790045328839 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ECDHClientKeyExchange ECDH Public value: { 4, 37, 211, 71, 247, 165, 9, 47, 236, 240, 116, 229, 47, 221, 241, 121, 21, 229, 1, 158, 29, 107, 124, 95, 34, 123, 156, 57, 130, 235, 187, 17, 54, 233, 155, 138, 248, 236, 233, 122, 50, 45, 211, 6, 7, 175, 222, 113, 12, 29, 145, 102, 24, 54, 189, 212, 250, 101, 221, 243, 83, 58, 108, 148, 153 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: 52 2C 2B F7 5A 3B 6A 06 B7 67 7D F0 8F B6 4D 38 R,+.Z;j..g....M8 0010: 58 4B E9 F0 61 B8 F4 6F 4A 89 9F 3F 33 56 D4 F7 XK..a..oJ..?3V.. CONNECTION KEYGEN: Client Nonce: 0000: 67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E gBt...[......v.. 0010: FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B ....Qs.....h..m+ Server Nonce: 0000: 01 0A 19 F8 94 D8 BC 28 90 00 45 B1 92 4A B0 38 .......(..E..J.8 0010: F7 68 9D 25 90 34 14 11 66 06 3D 81 74 B5 6C D1 .h.%.4..f.=.t.l. Master Secret: 0000: 6F 90 5B BA 65 99 2B 43 7C 66 42 A0 DF 94 D4 8C o.[.e.+C.fB..... 0010: 2D 6B 1B 3C 31 B4 50 DE 1E 23 69 6B 88 98 90 6E -k.<1.P..#ik...n 0020: 13 4E 7B 79 93 2C 67 1E 10 99 BF 9B C7 F1 37 21 .N.y.,g.......7! Client MAC write Secret: 0000: 70 8C 23 DD CD 4E 9E 60 5E 4E 1E 36 C8 37 29 E9 p.#..N.`^N.6.7). 0010: 56 6C 08 0C 8C 86 81 07 48 8B 81 71 FD ED 4C 67 Vl......H..q..Lg Server MAC write Secret: 0000: ED AE DA A3 81 4E 79 1C 80 D4 61 3D D5 0B 16 D9 .....Ny...a=.... 0010: EF 81 77 66 B9 58 61 66 BF 90 46 9B 9A A9 10 1F ..wf.Xaf..F..... Client write key: 0000: C7 28 59 55 9F FD 67 77 DF F9 0A 41 84 F4 C0 17 .(YU..gw...A.... Server write key: 0000: 2D B7 50 EB 8A FE 44 9F 31 7B 1D EE 03 03 C9 44 -.P...D.1......D ... no IV derived for this protocol update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 39, 185, 255, 25, 129, 214, 233, 48, 62, 63, 133, 131 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 78 pool-1-thread-2, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 24 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 78 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Change Cipher Spec, length = 1 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 80 check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDHClientKeyExchange ECDH Public value: { 4, 37, 211, 71, 247, 165, 9, 47, 236, 240, 116, 229, 47, 221, 241, 121, 21, 229, 1, 158, 29, 107, 124, 95, 34, 123, 156, 57, 130, 235, 187, 17, 54, 233, 155, 138, 248, 236, 233, 122, 50, 45, 211, 6, 7, 175, 222, 113, 12, 29, 145, 102, 24, 54, 189, 212, 250, 101, 221, 243, 83, 58, 108, 148, 153 } SESSION KEYGEN: PreMaster Secret: 0000: 52 2C 2B F7 5A 3B 6A 06 B7 67 7D F0 8F B6 4D 38 R,+.Z;j..g....M8 0010: 58 4B E9 F0 61 B8 F4 6F 4A 89 9F 3F 33 56 D4 F7 XK..a..oJ..?3V.. CONNECTION KEYGEN: Client Nonce: 0000: 67 42 74 F9 14 B3 5B 8E FE C2 1E AB A7 76 FE 7E gBt...[......v.. 0010: FE E3 B6 FD 51 73 EA 98 F9 C3 B6 68 2E 8C 6D 2B ....Qs.....h..m+ Server Nonce: 0000: 01 0A 19 F8 94 D8 BC 28 90 00 45 B1 92 4A B0 38 .......(..E..J.8 0010: F7 68 9D 25 90 34 14 11 66 06 3D 81 74 B5 6C D1 .h.%.4..f.=.t.l. Master Secret: 0000: 6F 90 5B BA 65 99 2B 43 7C 66 42 A0 DF 94 D4 8C o.[.e.+C.fB..... 0010: 2D 6B 1B 3C 31 B4 50 DE 1E 23 69 6B 88 98 90 6E -k.<1.P..#ik...n 0020: 13 4E 7B 79 93 2C 67 1E 10 99 BF 9B C7 F1 37 21 .N.y.,g.......7! Client MAC write Secret: 0000: 70 8C 23 DD CD 4E 9E 60 5E 4E 1E 36 C8 37 29 E9 p.#..N.`^N.6.7). 0010: 56 6C 08 0C 8C 86 81 07 48 8B 81 71 FD ED 4C 67 Vl......H..q..Lg Server MAC write Secret: 0000: ED AE DA A3 81 4E 79 1C 80 D4 61 3D D5 0B 16 D9 .....Ny...a=.... 0010: EF 81 77 66 B9 58 61 66 BF 90 46 9B 9A A9 10 1F ..wf.Xaf..F..... Client write key: 0000: C7 28 59 55 9F FD 67 77 DF F9 0A 41 84 F4 C0 17 .(YU..gw...A.... Server write key: 0000: 2D B7 50 EB 8A FE 44 9F 31 7B 1D EE 03 03 C9 44 -.P...D.1......D ... no IV derived for this protocol Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 39, 185, 255, 25, 129, 214, 233, 48, 62, 63, 133, 131 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] *** Finished verify_data: { 90, 31, 23, 46, 163, 65, 34, 12, 156, 162, 96, 2 } *** update handshake state: finished[20] %% Cached server session: [Session-2, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] pool-1-thread-1, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 24 Server: Produce handshake packets: Handshake status is FINISHED, finish the loop Server: Handshake status is FINISHED after producing handshake packets, finish the loop Server: Handshake finished, status is NOT_HANDSHAKING Server: Negotiated protocol is DTLSv1.2 Server: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 pool-1-thread-2, READ: DTLSv1.2 Change Cipher Spec, length = 1 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 80 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 90, 31, 23, 46, 163, 65, 34, 12, 156, 162, 96, 2 } *** %% Cached client session: [Session-3, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256] Client: Handshake status is FINISHED, finish the loop Client: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated protocol is DTLSv1.2 Client: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 pool-1-thread-2, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-1, READ: DTLSv1.2 Application Data, length = 80 Received application data 0000: 48 69 20 53 65 72 76 65 72 2C 20 49 27 6D 20 43 Hi Server, I'm C 0010: 6C 69 65 6E 74 lient pool-1-thread-1, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-2, READ: DTLSv1.2 Application Data, length = 80 Received application data 0000: 48 69 20 43 6C 69 65 6E 74 2C 20 49 27 6D 20 53 Hi Client, I'm S 0010: 65 72 76 65 72 erver Client finished: Well done, client! Client finished: Well done, server! ----------System.err:(1/15)---------- STATUS:Passed. ----------rerun:(23/1855)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.1.jta TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 result: Passed. Execution successful #section:build ----------messages:(3/94)---------- command: build CipherSuite reason: Named class compiled on demand elapsed time (seconds): 0.0 result: Passed. All files up to date #section:main ----------messages:(4/216)---------- command: main CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA256 reason: User specified action: run main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA256 Mode: othervm [/othervm specified] elapsed time (seconds): 2.604 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(822/44876)---------- *** found key for : dummydsa *** found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 No available cipher suite for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {28 BF 81 D7 95 65 5B 2B 78 27 45 A9 62 9E F4 4F 54 B4 15 69 2C 84 0C A8 F7 20 7C 90 11 A2 2E B1} Session ID: {} cookie: { } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 122 Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 122 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {28 BF 81 D7 95 65 5B 2B 78 27 45 A9 62 9E F4 4F 54 B4 15 69 2C 84 0C A8 F7 20 7C 90 11 A2 2E B1} Session ID: {} cookie: { } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 241, 214, 200, 239, 181, 14, 219, 54, 23, 188, 224, 187, 179, 230, 241, 218, 229, 168, 128, 158, 30, 6, 104, 132, 54, 239, 79, 83, 155, 91, 45, 67 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 241, 214, 200, 239, 181, 14, 219, 54, 23, 188, 224, 187, 179, 230, 241, 218, 229, 168, 128, 158, 30, 6, 104, 132, 54, 239, 79, 83, 155, 91, 45, 67 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {28 BF 81 D7 95 65 5B 2B 78 27 45 A9 62 9E F4 4F 54 B4 15 69 2C 84 0C A8 F7 20 7C 90 11 A2 2E B1} Session ID: {} cookie: { 241, 214, 200, 239, 181, 14, 219, 54, 23, 188, 224, 187, 179, 230, 241, 218, 229, 168, 128, 158, 30, 6, 104, 132, 54, 239, 79, 83, 155, 91, 45, 67 } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 154 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 154 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {28 BF 81 D7 95 65 5B 2B 78 27 45 A9 62 9E F4 4F 54 B4 15 69 2C 84 0C A8 F7 20 7C 90 11 A2 2E B1} Session ID: {} cookie: { 241, 214, 200, 239, 181, 14, 219, 54, 23, 188, 224, 187, 179, 230, 241, 218, 229, 168, 128, 158, 30, 6, 104, 132, 54, 239, 79, 83, 155, 91, 45, 67 } Cipher Suites: [TLS_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA256] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {DB 4D EA 16 AC 01 72 A5 4D A7 7B 6E 1E DF BB DB 87 E4 C0 86 06 DE A6 B0 F7 82 85 7B E5 F9 09 36} Session ID: {195, 29, 0, 140, 79, 109, 220, 214, 250, 35, 154, 84, 63, 192, 190, 177, 196, 6, 220, 210, 69, 9, 157, 199, 202, 29, 185, 36, 127, 154, 31, 105} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {DB 4D EA 16 AC 01 72 A5 4D A7 7B 6E 1E DF BB DB 87 E4 C0 86 06 DE A6 B0 F7 82 85 7B E5 F9 09 36} Session ID: {195, 29, 0, 140, 79, 109, 220, 214, 250, 35, 154, 84, 63, 192, 190, 177, 196, 6, 220, 210, 69, 9, 157, 199, 202, 29, 185, 36, 127, 154, 31, 105} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA256] ** TLS_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, DTLSv1.2 update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: FE FD C4 4D E2 CB C5 6A 8E D4 41 B2 43 15 51 16 ...M...j..A.C.Q. 0010: 46 D9 A6 FD 6D 08 57 E4 76 23 AC 71 D7 15 10 B1 F...m.W.v#.q.... 0020: 06 4C 30 CE 9C 27 D0 17 1C EF 3B BD 54 FF BE 01 .L0..'....;.T... CONNECTION KEYGEN: Client Nonce: 0000: 28 BF 81 D7 95 65 5B 2B 78 27 45 A9 62 9E F4 4F (....e[+x'E.b..O 0010: 54 B4 15 69 2C 84 0C A8 F7 20 7C 90 11 A2 2E B1 T..i,.... ...... Server Nonce: 0000: DB 4D EA 16 AC 01 72 A5 4D A7 7B 6E 1E DF BB DB .M....r.M..n.... 0010: 87 E4 C0 86 06 DE A6 B0 F7 82 85 7B E5 F9 09 36 ...............6 Master Secret: 0000: F7 D7 72 C1 EC 38 DD B2 42 4A 39 B2 C9 8C 6D F2 ..r..8..BJ9...m. 0010: 84 43 AA CE 25 8E 4C 9D 94 A0 97 53 C2 52 97 EB .C..%.L....S.R.. 0020: 7E D1 9A 3F C2 42 F6 F9 F5 9C 37 6D FC CE 36 36 ...?.B....7m..66 Client MAC write Secret: 0000: E0 5D 05 CF 0E EC 7C A2 03 7B CB 23 35 53 FE 39 .].........#5S.9 0010: 61 2C D3 E5 5F C9 93 B1 4C 0E 41 3C 72 DD 12 06 a,.._...L.A.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 No available cipher suite for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D} Session ID: {} cookie: { } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 122 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 122 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D} Session ID: {} cookie: { } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 222, 1, 122, 202, 15, 247, 35, 207, 189, 82, 120, 229, 213, 58, 18, 166, 139, 165, 156, 19, 12, 101, 195, 29, 221, 63, 231, 17, 250, 193, 242, 116 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 222, 1, 122, 202, 15, 247, 35, 207, 189, 82, 120, 229, 213, 58, 18, 166, 139, 165, 156, 19, 12, 101, 195, 29, 221, 63, 231, 17, 250, 193, 242, 116 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D} Session ID: {} cookie: { 222, 1, 122, 202, 15, 247, 35, 207, 189, 82, 120, 229, 213, 58, 18, 166, 139, 165, 156, 19, 12, 101, 195, 29, 221, 63, 231, 17, 250, 193, 242, 116 } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 154 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 154 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D} Session ID: {} cookie: { 222, 1, 122, 202, 15, 247, 35, 207, 189, 82, 120, 229, 213, 58, 18, 166, 139, 165, 156, 19, 12, 101, 195, 29, 221, 63, 231, 17, 250, 193, 242, 116 } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {B2 E5 CD DA D2 18 9E 6D 11 16 2A 10 4D F7 FC A9 2C 6B 1C C5 02 C6 74 4B A9 D2 24 EC 85 C9 F6 DC} Session ID: {22, 6, 131, 6, 144, 136, 171, 219, 248, 222, 247, 47, 147, 4, 61, 100, 147, 70, 161, 253, 245, 209, 214, 200, 199, 189, 110, 110, 117, 247, 18, 60} Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 253, 23, 132, 247, 198, 230, 24, 239, 54, 170, 98, 158, 238, 60, 67, 224, 231, 219, 15, 147, 189, 160, 11, 187, 114, 135, 68, 36, 236, 57, 155, 184, 13, 193, 31, 182, 1, 109, 57, 170, 229, 9, 154, 120, 85, 216, 153, 103, 181, 125, 131, 124, 178, 217, 71, 80, 239, 159, 153, 34, 177, 94, 2, 167, 184, 17, 136, 39, 137, 148, 12, 127, 230, 177, 78, 211, 25, 25, 2, 255, 66, 186, 42, 111, 243, 30, 108, 197, 182, 148, 43, 175, 167, 28, 166, 87, 111, 31, 17, 47, 133, 119, 194, 8, 40, 211, 24, 18, 184, 38, 104, 193, 214, 147, 14, 33, 150, 81, 91, 179, 207, 115, 86, 180, 154, 194, 229, 166 } Signature Algorithm SHA512withRSA Signed with a DSA or RSA public key update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 535 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 535 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {B2 E5 CD DA D2 18 9E 6D 11 16 2A 10 4D F7 FC A9 2C 6B 1C C5 02 C6 74 4B A9 D2 24 EC 85 C9 F6 DC} Session ID: {22, 6, 131, 6, 144, 136, 171, 219, 248, 222, 247, 47, 147, 4, 61, 100, 147, 70, 161, 253, 245, 209, 214, 200, 199, 189, 110, 110, 117, 247, 18, 60} Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] ** TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 253, 23, 132, 247, 198, 230, 24, 239, 54, 170, 98, 158, 238, 60, 67, 224, 231, 219, 15, 147, 189, 160, 11, 187, 114, 135, 68, 36, 236, 57, 155, 184, 13, 193, 31, 182, 1, 109, 57, 170, 229, 9, 154, 120, 85, 216, 153, 103, 181, 125, 131, 124, 178, 217, 71, 80, 239, 159, 153, 34, 177, 94, 2, 167, 184, 17, 136, 39, 137, 148, 12, 127, 230, 177, 78, 211, 25, 25, 2, 255, 66, 186, 42, 111, 243, 30, 108, 197, 182, 148, 43, 175, 167, 28, 166, 87, 111, 31, 17, 47, 133, 119, 194, 8, 40, 211, 24, 18, 184, 38, 104, 193, 214, 147, 14, 33, 150, 81, 91, 179, 207, 115, 86, 180, 154, 194, 229, 166 } Anonymous Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ClientKeyExchange, DH DH Public key: { 101, 158, 22, 144, 0, 219, 42, 244, 88, 235, 85, 129, 159, 53, 143, 185, 85, 184, 20, 198, 143, 24, 108, 62, 25, 248, 115, 116, 240, 233, 27, 213, 191, 195, 138, 70, 172, 146, 99, 3, 162, 239, 28, 237, 126, 69, 227, 162, 218, 235, 3, 243, 50, 81, 211, 135, 165, 55, 87, 125, 9, 35, 31, 186, 245, 39, 64, 49, 103, 150, 68, 1, 173, 246, 95, 111, 23, 26, 224, 14, 122, 171, 87, 220, 48, 249, 82, 180, 242, 210, 190, 225, 98, 95, 56, 210, 161, 220, 21, 10, 176, 249, 171, 137, 203, 223, 65, 208, 58, 111, 56, 19, 102, 223, 214, 230, 66, 44, 108, 42, 252, 95, 229, 184, 20, 240, 233, 46 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: C6 D4 4E 9C 4C 62 7E 45 72 67 D3 F2 93 B6 A5 20 ..N.Lb.Erg..... 0010: E4 22 2A 1D 2B 63 C8 A2 9B F8 96 A8 09 A6 41 17 ."*.+c........A. 0020: 8F AE 7F FF A3 2A A8 E4 04 44 2A 64 BA 15 D3 CE .....*...D*d.... 0030: 40 1E BC 66 13 9B 36 12 5D 45 CE 3E 66 8C 91 07 @..f..6.]E.>f... 0040: CA 0B 85 A8 A3 B3 53 55 AC 67 53 B8 C8 ED 7A 57 ......SU.gS...zW 0050: B1 51 3D 8A 06 F2 82 C2 4C 1B 98 3D 69 65 0E C0 .Q=.....L..=ie.. 0060: 62 22 9F CE 5E C6 90 DE A1 09 9B CC 4F 7E 15 E2 b"..^.......O... 0070: 58 2A 6C 22 6E 04 DC F5 5D 8B C5 54 9A 76 B1 5D X*l"n...]..T.v.] CONNECTION KEYGEN: Client Nonce: 0000: 36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 6...R.V%...)...) 0010: CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D ...,i8Ej.p..;... Server Nonce: 0000: B2 E5 CD DA D2 18 9E 6D 11 16 2A 10 4D F7 FC A9 .......m..*.M... 0010: 2C 6B 1C C5 02 C6 74 4B A9 D2 24 EC 85 C9 F6 DC ,k....tK..$..... Master Secret: 0000: A5 32 9B F9 FC 57 34 20 88 FD 76 29 F1 3E 11 C8 .2...W4 ..v).>.. 0010: F5 1C 00 FB 1E 35 29 9F CB D1 5A F8 09 72 A8 4B .....5)...Z..r.K 0020: 50 A0 0F 6B CE 19 0A 26 6B 80 6A 34 4C FE D3 45 P..k...&k.j4L..E Client MAC write Secret: 0000: 56 94 1F 60 64 E2 1A 42 73 0C 0A 23 90 21 CA 66 V..`d..Bs..#.!.f 0010: 90 37 E7 3D 04 0F ED E0 6E 0C EB 3A CF 01 F0 BB .7.=....n..:.... Server MAC write Secret: 0000: CA 82 3E 73 D8 4B 1F 1A AB 15 BD AE 64 26 63 61 ..>s.K......d&ca 0010: AC 49 A4 A0 0E B2 1D 82 4E 3A EF A0 85 B8 1D BA .I......N:...... Client write key: 0000: B3 35 88 69 5A 1A A4 54 03 72 C7 65 9E 30 29 5A .5.iZ..T.r.e.0)Z Server write key: 0000: E2 81 E7 19 3C 90 B5 1F 9B 52 FF 9C 37 32 D1 AA ....<....R..72.. ... no IV derived for this protocol update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 47, 214, 221, 172, 21, 150, 230, 120, 166, 123, 178, 3 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 142 pool-1-thread-2, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 24 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 142 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Change Cipher Spec, length = 1 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 80 check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ClientKeyExchange, DH DH Public key: { 101, 158, 22, 144, 0, 219, 42, 244, 88, 235, 85, 129, 159, 53, 143, 185, 85, 184, 20, 198, 143, 24, 108, 62, 25, 248, 115, 116, 240, 233, 27, 213, 191, 195, 138, 70, 172, 146, 99, 3, 162, 239, 28, 237, 126, 69, 227, 162, 218, 235, 3, 243, 50, 81, 211, 135, 165, 55, 87, 125, 9, 35, 31, 186, 245, 39, 64, 49, 103, 150, 68, 1, 173, 246, 95, 111, 23, 26, 224, 14, 122, 171, 87, 220, 48, 249, 82, 180, 242, 210, 190, 225, 98, 95, 56, 210, 161, 220, 21, 10, 176, 249, 171, 137, 203, 223, 65, 208, 58, 111, 56, 19, 102, 223, 214, 230, 66, 44, 108, 42, 252, 95, 229, 184, 20, 240, 233, 46 } SESSION KEYGEN: PreMaster Secret: 0000: C6 D4 4E 9C 4C 62 7E 45 72 67 D3 F2 93 B6 A5 20 ..N.Lb.Erg..... 0010: E4 22 2A 1D 2B 63 C8 A2 9B F8 96 A8 09 A6 41 17 ."*.+c........A. 0020: 8F AE 7F FF A3 2A A8 E4 04 44 2A 64 BA 15 D3 CE .....*...D*d.... 0030: 40 1E BC 66 13 9B 36 12 5D 45 CE 3E 66 8C 91 07 @..f..6.]E.>f... 0040: CA 0B 85 A8 A3 B3 53 55 AC 67 53 B8 C8 ED 7A 57 ......SU.gS...zW 0050: B1 51 3D 8A 06 F2 82 C2 4C 1B 98 3D 69 65 0E C0 .Q=.....L..=ie.. 0060: 62 22 9F CE 5E C6 90 DE A1 09 9B CC 4F 7E 15 E2 b"..^.......O... 0070: 58 2A 6C 22 6E 04 DC F5 5D 8B C5 54 9A 76 B1 5D X*l"n...]..T.v.] CONNECTION KEYGEN: Client Nonce: 0000: 36 FE A7 8B 52 86 56 25 AC E9 7D 29 F0 7C 82 29 6...R.V%...)...) 0010: CA BC C1 2C 69 38 45 6A E9 70 02 8D 3B DA C8 8D ...,i8Ej.p..;... Server Nonce: 0000: B2 E5 CD DA D2 18 9E 6D 11 16 2A 10 4D F7 FC A9 .......m..*.M... 0010: 2C 6B 1C C5 02 C6 74 4B A9 D2 24 EC 85 C9 F6 DC ,k....tK..$..... Master Secret: 0000: A5 32 9B F9 FC 57 34 20 88 FD 76 29 F1 3E 11 C8 .2...W4 ..v).>.. 0010: F5 1C 00 FB 1E 35 29 9F CB D1 5A F8 09 72 A8 4B .....5)...Z..r.K 0020: 50 A0 0F 6B CE 19 0A 26 6B 80 6A 34 4C FE D3 45 P..k...&k.j4L..E Client MAC write Secret: 0000: 56 94 1F 60 64 E2 1A 42 73 0C 0A 23 90 21 CA 66 V..`d..Bs..#.!.f 0010: 90 37 E7 3D 04 0F ED E0 6E 0C EB 3A CF 01 F0 BB .7.=....n..:.... Server MAC write Secret: 0000: CA 82 3E 73 D8 4B 1F 1A AB 15 BD AE 64 26 63 61 ..>s.K......d&ca 0010: AC 49 A4 A0 0E B2 1D 82 4E 3A EF A0 85 B8 1D BA .I......N:...... Client write key: 0000: B3 35 88 69 5A 1A A4 54 03 72 C7 65 9E 30 29 5A .5.iZ..T.r.e.0)Z Server write key: 0000: E2 81 E7 19 3C 90 B5 1F 9B 52 FF 9C 37 32 D1 AA ....<....R..72.. ... no IV derived for this protocol Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 47, 214, 221, 172, 21, 150, 230, 120, 166, 123, 178, 3 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] *** Finished verify_data: { 111, 232, 111, 103, 29, 180, 77, 189, 18, 192, 175, 192 } *** update handshake state: finished[20] %% Cached server session: [Session-2, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] pool-1-thread-1, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 24 Server: Produce handshake packets: Handshake status is FINISHED, finish the loop Server: Handshake status is FINISHED after producing handshake packets, finish the loop pool-1-thread-2, READ: DTLSv1.2 Change Cipher Spec, length = 1 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 80 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN Server: Handshake finished, status is NOT_HANDSHAKING check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 111, 232, 111, 103, 29, 180, 77, 189, 18, 192, 175, 192 } *** Server: Negotiated protocol is DTLSv1.2 Server: Negotiated cipher suite is TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 %% Cached client session: [Session-3, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256] Client: Handshake status is FINISHED, finish the loop Client: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated protocol is DTLSv1.2 Client: Negotiated cipher suite is TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 pool-1-thread-2, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-1, READ: DTLSv1.2 Application Data, length = 80 Received application data 0000: 48 69 20 53 65 72 76 65 72 2C 20 49 27 6D 20 43 Hi Server, I'm C 0010: 6C 69 65 6E 74 lient pool-1-thread-1, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-2, READ: DTLSv1.2 Application Data, length = 80 Received application data 0000: 48 69 20 43 6C 69 65 6E 74 2C 20 49 27 6D 20 53 Hi Client, I'm S 0010: 65 72 76 65 72 erver Client finished: Well done, client! Client finished: Well done, server! ----------System.err:(1/15)---------- STATUS:Passed. ----------rerun:(23/1853)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.3.jta TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 result: Passed. Execution successful #section:build ----------messages:(3/94)---------- command: build CipherSuite reason: Named class compiled on demand elapsed time (seconds): 0.0 result: Passed. All files up to date #section:main ----------messages:(4/222)---------- command: main CipherSuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA reason: User specified action: run main/othervm CipherSuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Mode: othervm [/othervm specified] elapsed time (seconds): 2.817 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(869/48963)*---------- *** found key for : dummydsa *** found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 184 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 57, 217, 14, 225, 14, 152, 1, 177, 79, 53, 62, 33, 246, 94, 12, 149, 228, 11, 142, 15, 26, 10, 49, 69, 79, 74, 67, 78, 49, 235, 195, 37 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 57, 217, 14, 225, 14, 152, 1, 177, 79, 53, 62, 33, 246, 94, 12, 149, 228, 11, 142, 15, 26, 10, 49, 69, 79, 74, 67, 78, 49, 235, 195, 37 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D} Session ID: {} cookie: { 57, 217, 14, 225, 14, 152, 1, 177, 79, 53, 62, 33, 246, 94, 12, 149, 228, 11, 142, 15, 26, 10, 49, 69, 79, 74, 67, 78, 49, 235, 195, 37 } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 216 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 216 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D} Session ID: {} cookie: { 57, 217, 14, 225, 14, 152, 1, 177, 79, 53, 62, 33, 246, 94, 12, 149, 228, 11, 142, 15, 26, 10, 49, 69, 79, 74, 67, 78, 49, 235, 195, 37 } Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {9F B2 08 BF 7B B6 41 AA 65 14 6E 4A AB DD DE 60 F6 0C 9D 00 46 9A 13 7B B4 A6 F1 FD 08 B4 F7 7F} Session ID: {122, 161, 43, 158, 60, 88, 193, 197, 31, 0, 105, 168, 177, 181, 135, 181, 96, 218, 235, 48, 136, 68, 147, 113, 221, 186, 160, 21, 23, 150, 1, 62} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 47083068729728665534169702418363861188539711894776303864253083955752674590518 public y coord: 70033030518487262675827361986778122333935635473600259242138228159274503911640 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 341 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 341 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {9F B2 08 BF 7B B6 41 AA 65 14 6E 4A AB DD DE 60 F6 0C 9D 00 46 9A 13 7B B4 A6 F1 FD 08 B4 F7 7F} Session ID: {122, 161, 43, 158, 60, 88, 193, 197, 31, 0, 105, 168, 177, 181, 135, 181, 96, 218, 235, 48, 136, 68, 147, 113, 221, 186, 160, 21, 23, 150, 1, 62} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] ** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 47083068729728665534169702418363861188539711894776303864253083955752674590518 public y coord: 70033030518487262675827361986778122333935635473600259242138228159274503911640 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ECDHClientKeyExchange ECDH Public value: { 4, 104, 157, 18, 124, 193, 0, 58, 136, 199, 49, 103, 146, 234, 138, 59, 248, 179, 226, 13, 146, 32, 190, 109, 4, 224, 74, 46, 41, 142, 166, 168, 86, 101, 3, 33, 159, 236, 202, 12, 127, 181, 97, 253, 230, 183, 255, 22, 183, 90, 65, 136, 190, 176, 83, 154, 190, 146, 65, 66, 149, 51, 76, 86, 3 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: CC 35 AC F6 8B 68 EC 67 BE 03 C3 83 91 94 75 E5 .5...h.g......u. 0010: FF A6 83 7A 20 29 C6 3C C5 E6 A9 8B C0 5C A3 7B ...z ).<.....\\.. CONNECTION KEYGEN: Client Nonce: 0000: DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C .Po...CUt..c.... 0010: 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D .ko...R..a..,.p- Server Nonce: 0000: 9F B2 08 BF 7B B6 41 AA 65 14 6E 4A AB DD DE 60 ......A.e.nJ...` 0010: F6 0C 9D 00 46 9A 13 7B B4 A6 F1 FD 08 B4 F7 7F ....F........... Master Secret: 0000: BA 92 C6 95 4E E4 B0 9D D2 0B 0B ED EA 0F 47 66 ....N.........Gf 0010: FA 96 48 84 66 28 9B D1 38 05 6B F5 F0 7C B5 3D ..H.f(..8.k....= 0020: 60 96 57 41 DD 95 D2 68 26 BE EC EA 0F C1 94 C1 `.WA...h&....... Client MAC write Secret: 0000: 59 B9 AD A7 91 D0 EF E5 3F C8 5D 45 31 DE 6F E3 Y.......?.]E1.o. 0010: 61 53 D3 A3 aS.. Server MAC write Secret: 0000: 6D 4E 53 6F 78 C4 91 F5 4C BD 8B FC 3E A6 0B 6F mNSox...L...>..o 0010: 12 F4 9D 3E ...> Client write key: 0000: A3 5A 7F C9 2D 62 D0 16 73 CD 8E 97 F7 A1 5F 1A .Z..-b..s....._. Server write key: 0000: 3E 5F 11 8D 36 42 AF 5F 47 EF 1A ED 33 7B 98 E2 >_..6B._G...3... ... no IV derived for this protocol update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 114, 98, 186, 222, 232, 18, 101, 226, 216, 186, 195, 237 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 78 pool-1-thread-2, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 24 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 78 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Change Cipher Spec, length = 1 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 64 check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDHClientKeyExchange ECDH Public value: { 4, 104, 157, 18, 124, 193, 0, 58, 136, 199, 49, 103, 146, 234, 138, 59, 248, 179, 226, 13, 146, 32, 190, 109, 4, 224, 74, 46, 41, 142, 166, 168, 86, 101, 3, 33, 159, 236, 202, 12, 127, 181, 97, 253, 230, 183, 255, 22, 183, 90, 65, 136, 190, 176, 83, 154, 190, 146, 65, 66, 149, 51, 76, 86, 3 } SESSION KEYGEN: PreMaster Secret: 0000: CC 35 AC F6 8B 68 EC 67 BE 03 C3 83 91 94 75 E5 .5...h.g......u. 0010: FF A6 83 7A 20 29 C6 3C C5 E6 A9 8B C0 5C A3 7B ...z ).<.....\\.. CONNECTION KEYGEN: Client Nonce: 0000: DF 50 6F 2E B5 DB 43 55 74 E1 FB 63 C2 A7 FC 7C .Po...CUt..c.... 0010: 95 6B 6F EB 1E 8E 52 1B B4 61 06 AD 2C 03 70 2D .ko...R..a..,.p- Server Nonce: 0000: 9F B2 08 BF 7B B6 41 AA 65 14 6E 4A AB DD DE 60 ......A.e.nJ...` 0010: F6 0C 9D 00 46 9A 13 7B B4 A6 F1 FD 08 B4 F7 7F ....F........... Master Secret: 0000: BA 92 C6 95 4E E4 B0 9D D2 0B 0B ED EA 0F 47 66 ....N.........Gf 0010: FA 96 48 84 66 28 9B D1 38 05 6B F5 F0 7C B5 3D ..H.f(..8.k....= 0020: 60 96 57 41 DD 95 D2 68 26 BE EC EA 0F C1 94 C1 `.WA...h&....... Client MAC write Secret: 0000: 59 B9 AD A7 91 D0 EF E5 3F C8 5D 45 31 DE 6F E3 Y.......?.]E1.o. 0010: 61 53 D3 A3 aS.. Server MAC write Secret: 0000: 6D 4E 53 6F 78 C4 91 F5 4C BD 8B FC 3E A6 0B 6F mNSox...L...>..o 0010: 12 F4 9D 3E ...> Client write key: 0000: A3 5A 7F C9 2D 62 D0 16 73 CD 8E 97 F7 A1 5F 1A .Z..-b..s....._. Server write key: 0000: 3E 5F 11 8D 36 42 AF 5F 47 EF 1A ED 33 7B 98 E2 >_..6B._G...3... ... no IV derived for this protocol Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 114, 98, 186, 222, 232, 18, 101, 226, 216, 186, 195, 237 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] *** Finished verify_data: { 86, 150, 101, 167, 48, 29, 60, 198, 197, 187, 33, 28 } *** update handshake state: finished[20] %% Cached server session: [Session-2, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] pool-1-thread-1, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 24 Server: Produce handshake packets: Handshake status is FINISHED, finish the loop Server: Handshake status is FINISHED after producing handshake packets, finish the loop pool-1-thread-2, READ: DTLSv1.2 Change Cipher Spec, length = 1 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 64 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] Server: Handshake finished, status is NOT_HANDSHAKING Server: Negotiated protocol is DTLSv1.2 Server: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 86, 150, 101, 167, 48, 29, 60, 198, 197, 187, 33, 28 } *** %% Cached client session: [Session-3, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA] Client: Handshake status is FINISHED, finish the loop Client: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated protocol is DTLSv1.2 Client: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA pool-1-thread-2, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-1, READ: DTLSv1.2 Application Data, length = 64 Received application data 0000: 48 69 20 53 65 72 76 65 72 2C 20 49 27 6D 20 43 Hi Server, I'm C 0010: 6C 69 65 6E 74 lient pool-1-thread-1, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-2, READ: DTLSv1.2 Application Data, length = 64 Received application data 0000: 48 69 20 43 6C 69 65 6E 74 2C 20 49 27 6D 20 53 Hi Client, I'm S 0010: 65 72 76 65 72 erver Client finished: Well done, client! Client finished: Well done, server! ----------System.err:(1/15)---------- STATUS:Passed. ----------rerun:(23/1852)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.4.jta TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA result: Passed. Execution successful #section:build ----------messages:(3/94)---------- command: build CipherSuite reason: Named class compiled on demand elapsed time (seconds): 0.0 result: Passed. All files up to date #section:main ----------messages:(4/218)---------- command: main CipherSuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA reason: User specified action: run main/othervm CipherSuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA Mode: othervm [/othervm specified] elapsed time (seconds): 2.729 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(872/50845)*---------- *** *** found key for : dummydsa found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom done seeding SecureRandom Using SSLEngineImpl. trigger seeding of SecureRandom done seeding SecureRandom Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F} Session ID: {} cookie: { } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 122 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 122 Client: Receive DTLS records, handshake status is NEED_UNWRAP check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F} Session ID: {} cookie: { } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 129, 64, 116, 111, 26, 84, 119, 61, 87, 238, 118, 106, 102, 19, 48, 183, 102, 21, 17, 160, 149, 43, 217, 126, 144, 233, 67, 244, 67, 111, 175, 66 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 129, 64, 116, 111, 26, 84, 119, 61, 87, 238, 118, 106, 102, 19, 48, 183, 102, 21, 17, 160, 149, 43, 217, 126, 144, 233, 67, 244, 67, 111, 175, 66 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F} Session ID: {} cookie: { 129, 64, 116, 111, 26, 84, 119, 61, 87, 238, 118, 106, 102, 19, 48, 183, 102, 21, 17, 160, 149, 43, 217, 126, 144, 233, 67, 244, 67, 111, 175, 66 } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 154 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 154 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F} Session ID: {} cookie: { 129, 64, 116, 111, 26, 84, 119, 61, 87, 238, 118, 106, 102, 19, 48, 183, 102, 21, 17, 160, 149, 43, 217, 126, 144, 233, 67, 244, 67, 111, 175, 66 } Cipher Suites: [TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {C2 0F 88 8E 1A 71 F9 4C 8D 7C FC 00 52 D8 B6 C5 C3 1E 9C 18 48 B7 C4 26 13 91 E4 33 E4 A6 A7 9D} Session ID: {152, 74, 103, 108, 181, 115, 136, 183, 234, 173, 160, 233, 116, 154, 237, 215, 195, 136, 62, 236, 26, 163, 172, 206, 204, 225, 28, 209, 142, 186, 52, 8} Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 100, 239, 29, 196, 192, 129, 164, 216, 103, 73, 101, 135, 121, 217, 14, 153, 120, 88, 33, 167, 58, 29, 109, 24, 30, 133, 62, 172, 74, 150, 217, 144, 90, 80, 203, 58, 73, 191, 62, 44, 130, 72, 5, 19, 64, 202, 3, 161, 4, 171, 255, 68, 197, 147, 106, 9, 246, 217, 110, 136, 19, 200, 157, 129, 222, 107, 137, 66, 37, 113, 1, 161, 199, 130, 54, 182, 138, 5, 78, 32, 17, 147, 193, 219, 25, 142, 210, 79, 31, 30, 135, 166, 170, 209, 218, 10, 211, 4, 20, 0, 54, 36, 212, 249, 155, 137, 73, 5, 108, 38, 182, 184, 147, 41, 57, 45, 153, 130, 203, 33, 130, 166, 226, 129, 39, 212, 139, 243 } Signature Algorithm SHA512withRSA Signed with a DSA or RSA public key update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 535 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 535 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {C2 0F 88 8E 1A 71 F9 4C 8D 7C FC 00 52 D8 B6 C5 C3 1E 9C 18 48 B7 C4 26 13 91 E4 33 E4 A6 A7 9D} Session ID: {152, 74, 103, 108, 181, 115, 136, 183, 234, 173, 160, 233, 116, 154, 237, 215, 195, 136, 62, 236, 26, 163, 172, 206, 204, 225, 28, 209, 142, 186, 52, 8} Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] ** TLS_DHE_RSA_WITH_AES_128_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 100, 239, 29, 196, 192, 129, 164, 216, 103, 73, 101, 135, 121, 217, 14, 153, 120, 88, 33, 167, 58, 29, 109, 24, 30, 133, 62, 172, 74, 150, 217, 144, 90, 80, 203, 58, 73, 191, 62, 44, 130, 72, 5, 19, 64, 202, 3, 161, 4, 171, 255, 68, 197, 147, 106, 9, 246, 217, 110, 136, 19, 200, 157, 129, 222, 107, 137, 66, 37, 113, 1, 161, 199, 130, 54, 182, 138, 5, 78, 32, 17, 147, 193, 219, 25, 142, 210, 79, 31, 30, 135, 166, 170, 209, 218, 10, 211, 4, 20, 0, 54, 36, 212, 249, 155, 137, 73, 5, 108, 38, 182, 184, 147, 41, 57, 45, 153, 130, 203, 33, 130, 166, 226, 129, 39, 212, 139, 243 } Anonymous Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ClientKeyExchange, DH DH Public key: { 156, 137, 59, 6, 56, 4, 161, 136, 4, 130, 207, 137, 215, 104, 91, 207, 99, 160, 155, 84, 117, 131, 181, 241, 203, 32, 110, 107, 127, 10, 118, 150, 91, 200, 240, 229, 55, 145, 236, 55, 141, 87, 198, 180, 234, 195, 101, 235, 96, 49, 177, 197, 117, 241, 31, 169, 95, 83, 160, 194, 44, 77, 163, 225, 202, 145, 25, 104, 244, 67, 205, 115, 203, 123, 1, 19, 250, 121, 97, 171, 214, 204, 196, 198, 178, 178, 124, 23, 44, 241, 233, 245, 58, 248, 88, 167, 105, 82, 130, 182, 138, 93, 18, 114, 134, 109, 14, 16, 249, 4, 55, 204, 153, 107, 35, 144, 104, 98, 68, 18, 62, 70, 108, 253, 146, 183, 72, 95 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: 87 3A 42 39 93 39 01 29 48 F7 43 8D DE 51 9A B6 .:B9.9.)H.C..Q.. 0010: 03 AC 3A A0 8B 8E 64 D2 C7 D1 96 11 20 7F 6A 1C ..:...d..... .j. 0020: EC 2A DF 5A B4 17 AF 1A 63 29 02 4D C4 A9 B9 AB .*.Z....c).M.... 0030: 04 0B 7F 47 E6 10 CE AB 45 1C 74 57 0C 25 5C BD ...G....E.tW.%\\. 0040: 34 2A 37 8A 3B 1F A8 00 58 0C EA 6A 50 E9 2F CF 4*7.;...X..jP./. 0050: E5 61 E2 9D DF 6E FD CE 9D E0 C9 6A 53 E5 9B 18 .a...n.....jS... 0060: 8E AE 75 9A 4E 15 12 6B B1 B4 93 3D 32 D5 33 33 ..u.N..k...=2.33 0070: 33 72 23 61 E3 F7 78 19 83 C6 D6 B1 49 8A 45 93 3r#a..x.....I.E. CONNECTION KEYGEN: Client Nonce: 0000: 4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF M...P.jk.A.C..g. 0010: 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F .f.>.2_.......J. Server Nonce: 0000: C2 0F 88 8E 1A 71 F9 4C 8D 7C FC 00 52 D8 B6 C5 .....q.L....R... 0010: C3 1E 9C 18 48 B7 C4 26 13 91 E4 33 E4 A6 A7 9D ....H..&...3.... Master Secret: 0000: 2C E9 09 03 A9 AA 1C 75 CB 9F 92 CF A7 77 95 E1 ,......u.....w.. 0010: 98 FF 59 B4 F2 89 9F E9 68 B1 1E F5 F3 D5 FF F9 ..Y.....h....... 0020: 95 D4 AC E6 39 A1 C0 24 E8 E2 C8 DD 94 30 64 FB ....9..$.....0d. Client MAC write Secret: 0000: 5A D7 AE 77 13 AF A2 E4 A5 1D D1 B6 7F 4D C7 73 Z..w.........M.s 0010: 30 5B 4B 60 0[K` Server MAC write Secret: 0000: E2 E7 B7 C3 B2 D3 17 9C 89 85 83 51 99 D0 A7 C8 ...........Q.... 0010: 95 57 A4 86 .W.. Client write key: 0000: 40 B7 C7 64 DF 22 AC 6C 2E D9 EE 16 FD 78 B5 48 @..d.".l.....x.H Server write key: 0000: 29 2E 5E 91 F2 E8 96 B2 B6 2A E2 6A 74 C5 24 B4 ).^......*.jt.$. ... no IV derived for this protocol update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 246, 57, 235, 211, 153, 203, 78, 93, 149, 40, 89, 56 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 142 pool-1-thread-2, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 24 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 142 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Change Cipher Spec, length = 1 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 64 check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ClientKeyExchange, DH DH Public key: { 156, 137, 59, 6, 56, 4, 161, 136, 4, 130, 207, 137, 215, 104, 91, 207, 99, 160, 155, 84, 117, 131, 181, 241, 203, 32, 110, 107, 127, 10, 118, 150, 91, 200, 240, 229, 55, 145, 236, 55, 141, 87, 198, 180, 234, 195, 101, 235, 96, 49, 177, 197, 117, 241, 31, 169, 95, 83, 160, 194, 44, 77, 163, 225, 202, 145, 25, 104, 244, 67, 205, 115, 203, 123, 1, 19, 250, 121, 97, 171, 214, 204, 196, 198, 178, 178, 124, 23, 44, 241, 233, 245, 58, 248, 88, 167, 105, 82, 130, 182, 138, 93, 18, 114, 134, 109, 14, 16, 249, 4, 55, 204, 153, 107, 35, 144, 104, 98, 68, 18, 62, 70, 108, 253, 146, 183, 72, 95 } SESSION KEYGEN: PreMaster Secret: 0000: 87 3A 42 39 93 39 01 29 48 F7 43 8D DE 51 9A B6 .:B9.9.)H.C..Q.. 0010: 03 AC 3A A0 8B 8E 64 D2 C7 D1 96 11 20 7F 6A 1C ..:...d..... .j. 0020: EC 2A DF 5A B4 17 AF 1A 63 29 02 4D C4 A9 B9 AB .*.Z....c).M.... 0030: 04 0B 7F 47 E6 10 CE AB 45 1C 74 57 0C 25 5C BD ...G....E.tW.%\\. 0040: 34 2A 37 8A 3B 1F A8 00 58 0C EA 6A 50 E9 2F CF 4*7.;...X..jP./. 0050: E5 61 E2 9D DF 6E FD CE 9D E0 C9 6A 53 E5 9B 18 .a...n.....jS... 0060: 8E AE 75 9A 4E 15 12 6B B1 B4 93 3D 32 D5 33 33 ..u.N..k...=2.33 0070: 33 72 23 61 E3 F7 78 19 83 C6 D6 B1 49 8A 45 93 3r#a..x.....I.E. CONNECTION KEYGEN: Client Nonce: 0000: 4D 88 19 D7 50 89 6A 6B 95 41 CE 43 E7 03 67 DF M...P.jk.A.C..g. 0010: 7F 66 B9 3E A2 32 5F 99 EF FC F7 9B DB 8B 4A 8F .f.>.2_.......J. Server Nonce: 0000: C2 0F 88 8E 1A 71 F9 4C 8D 7C FC 00 52 D8 B6 C5 .....q.L....R... 0010: C3 1E 9C 18 48 B7 C4 26 13 91 E4 33 E4 A6 A7 9D ....H..&...3.... Master Secret: 0000: 2C E9 09 03 A9 AA 1C 75 CB 9F 92 CF A7 77 95 E1 ,......u.....w.. 0010: 98 FF 59 B4 F2 89 9F E9 68 B1 1E F5 F3 D5 FF F9 ..Y.....h....... 0020: 95 D4 AC E6 39 A1 C0 24 E8 E2 C8 DD 94 30 64 FB ....9..$.....0d. Client MAC write Secret: 0000: 5A D7 AE 77 13 AF A2 E4 A5 1D D1 B6 7F 4D C7 73 Z..w.........M.s 0010: 30 5B 4B 60 0[K` Server MAC write Secret: 0000: E2 E7 B7 C3 B2 D3 17 9C 89 85 83 51 99 D0 A7 C8 ...........Q.... 0010: 95 57 A4 86 .W.. Client write key: 0000: 40 B7 C7 64 DF 22 AC 6C 2E D9 EE 16 FD 78 B5 48 @..d.".l.....x.H Server write key: 0000: 29 2E 5E 91 F2 E8 96 B2 B6 2A E2 6A 74 C5 24 B4 ).^......*.jt.$. ... no IV derived for this protocol Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 246, 57, 235, 211, 153, 203, 78, 93, 149, 40, 89, 56 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] *** Finished verify_data: { 192, 222, 145, 176, 39, 230, 236, 194, 48, 156, 197, 16 } *** update handshake state: finished[20] %% Cached server session: [Session-2, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] pool-1-thread-1, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 24 Server: Produce handshake packets: Handshake status is FINISHED, finish the loop Server: Handshake status is FINISHED after producing handshake packets, finish the loop pool-1-thread-2, READ: DTLSv1.2 Change Cipher Spec, length = 1 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 64 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 192, 222, 145, 176, 39, 230, 236, 194, 48, 156, 197, 16 } *** %% Cached client session: [Session-3, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Client: Handshake status is FINISHED, finish the loop Client: Handshake finished, status is NOT_HANDSHAKING Server: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated protocol is DTLSv1.2 Server: Negotiated protocol is DTLSv1.2 Client: Negotiated cipher suite is TLS_DHE_RSA_WITH_AES_128_CBC_SHA pool-1-thread-2, WRITE: DTLSv1.2 Application Data, length = 21 Server: Negotiated cipher suite is TLS_DHE_RSA_WITH_AES_128_CBC_SHA pool-1-thread-1, READ: DTLSv1.2 Application Data, length = 64 Received application data 0000: 48 69 20 53 65 72 76 65 72 2C 20 49 27 6D 20 43 Hi Server, I'm C 0010: 6C 69 65 6E 74 lient pool-1-thread-1, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-2, READ: DTLSv1.2 Application Data, length = 64 Received application data 0000: 48 69 20 43 6C 69 65 6E 74 2C 20 49 27 6D 20 53 Hi Client, I'm S 0010: 65 72 76 65 72 erver Client finished: Well done, client! Client finished: Well done, server! ----------System.err:(1/15)---------- STATUS:Passed. ----------rerun:(23/1850)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.5.jta TLS_DHE_RSA_WITH_AES_128_CBC_SHA result: Passed. Execution successful #section:build ----------messages:(3/94)---------- command: build CipherSuite reason: Named class compiled on demand elapsed time (seconds): 0.0 result: Passed. All files up to date #section:main ----------messages:(4/223)---------- command: main CipherSuite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA reason: User specified action: run main/othervm CipherSuite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Mode: othervm [/othervm specified] elapsed time (seconds): 2.79 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(873/49303)*---------- *** found key for : dummydsa *** found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Algorithm: EC; Serial number: 0x57399c1d Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 184 Client: Receive DTLS records, handshake status is NEED_UNWRAP check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 250, 177, 238, 121, 201, 240, 253, 79, 85, 83, 204, 136, 241, 99, 78, 109, 19, 71, 119, 51, 194, 171, 152, 243, 3, 155, 139, 31, 63, 255, 94, 127 } update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 47 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 47 check handshake state: hello_verify_request[3] update handshake state: hello_verify_request[3] upcoming handshake states: client_hello[1] *** HelloVerifyRequest server_version: DTLSv1.2 cookie: { 250, 177, 238, 121, 201, 240, 253, 79, 85, 83, 204, 136, 241, 99, 78, 109, 19, 71, 119, 51, 194, 171, 152, 243, 3, 155, 139, 31, 63, 255, 94, 127 } *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60} Session ID: {} cookie: { 250, 177, 238, 121, 201, 240, 253, 79, 85, 83, 204, 136, 241, 99, 78, 109, 19, 71, 119, 51, 194, 171, 152, 243, 3, 155, 139, 31, 63, 255, 94, 127 } Cipher Suites: [TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 216 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 216 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] upcoming handshake alternative state: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60} Session ID: {} cookie: { 250, 177, 238, 121, 201, 240, 253, 79, 85, 83, 204, 136, 241, 99, 78, 109, 19, 71, 119, 51, 194, 171, 152, 243, 3, 155, 139, 31, 63, 255, 94, 127 } Cipher Suites: [TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: dummy %% Negotiating: [Session-2, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {89 7F A6 C4 EE 9E F3 1B 3F F7 03 E2 39 AB 1B AC D5 68 13 C8 E7 01 C0 87 38 56 E1 9B BE 31 2A 2B} Session ID: {64, 172, 161, 97, 91, 186, 239, 54, 3, 232, 19, 244, 34, 243, 255, 239, 204, 206, 160, 57, 64, 85, 96, 216, 65, 252, 67, 196, 121, 146, 210, 93} Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 101831098689426795762308478313249666851470653529495097282275858031427426223058 public y coord: 96312469434161750806136098018363314560239074266658997476481722493796321468542 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 89 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 865 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 341 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 12 pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 89 Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 865 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 341 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 12 check handshake state: server_hello[2] *** ServerHello, DTLSv1.2 RandomCookie: random_bytes = {89 7F A6 C4 EE 9E F3 1B 3F F7 03 E2 39 AB 1B AC D5 68 13 C8 E7 01 C0 87 38 56 E1 9B BE 31 2A 2B} Session ID: {64, 172, 161, 97, 91, 186, 239, 54, 3, 232, 19, 244, 34, 243, 255, 239, 204, 206, 160, 57, 64, 85, 96, 216, 65, 252, 67, 196, 121, 146, 210, 93} Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] ** TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** Found trusted certificate: [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 101831098689426795762308478313249666851470653529495097282275858031427426223058 public y coord: 96312469434161750806136098018363314560239074266658997476481722493796321468542 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone *** ECDHClientKeyExchange ECDH Public value: { 4, 200, 130, 16, 32, 193, 193, 142, 238, 144, 84, 216, 106, 167, 137, 137, 169, 3, 32, 22, 215, 170, 130, 128, 187, 227, 174, 171, 248, 79, 207, 204, 243, 159, 156, 208, 217, 194, 20, 61, 78, 175, 230, 181, 130, 144, 202, 116, 230, 140, 137, 79, 157, 214, 1, 32, 127, 148, 16, 36, 5, 248, 212, 123, 28 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] SESSION KEYGEN: PreMaster Secret: 0000: A3 70 C0 DF 41 B1 F4 33 3D 89 5A 48 63 FA 35 6F .p..A..3=.ZHc.5o 0010: BE 9E D3 6E DC 1A 47 8B 80 D5 8C D8 EC DC BD 5C ...n..G........\\ CONNECTION KEYGEN: Client Nonce: 0000: BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 .X..PuI)]..a...U 0010: 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60 ...0y^.&.n.P...` Server Nonce: 0000: 89 7F A6 C4 EE 9E F3 1B 3F F7 03 E2 39 AB 1B AC ........?...9... 0010: D5 68 13 C8 E7 01 C0 87 38 56 E1 9B BE 31 2A 2B .h......8V...1*+ Master Secret: 0000: 95 4B 8E 9F 89 B0 89 C4 18 B3 40 6D 07 11 0B B5 .K........@m.... 0010: 54 A9 C0 E6 28 EE CB 6A F3 0A 47 F9 66 70 89 56 T...(..j..G.fp.V 0020: C7 78 4A 71 DB 01 9D 5C 75 3F 42 10 4D 4A A9 7B .xJq...\\u?B.MJ.. Client MAC write Secret: 0000: 34 87 3F DA 14 29 6F E1 48 FA 0F 3E D2 F3 1A 6D 4.?..)o.H..>...m 0010: 62 69 36 09 bi6. Server MAC write Secret: 0000: 92 12 E1 D3 38 8A EF 41 15 DB A8 CD 05 F6 B6 AB ....8..A........ 0010: 56 1D 7C F4 V... Client write key: 0000: E5 9D 5E E8 2E 4C 83 89 8E 50 CC 32 91 98 30 EA ..^..L...P.2..0. 0010: AC 62 C3 25 84 9F A9 F2 .b.%.... Server write key: 0000: 58 97 88 83 C5 4F 8C 7A EB EF B4 E5 B5 2D 5D 5C X....O.z.....-]\\ 0010: 57 9B 85 0A 78 21 8D 82 W...x!.. ... no IV derived for this protocol update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 62, 11, 255, 9, 231, 200, 198, 156, 231, 255, 50, 156 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 78 pool-1-thread-2, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 24 pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 78 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Change Cipher Spec, length = 1 Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-1, READ: DTLSv1.2 Handshake, length = 56 Client: Receive DTLS records, handshake status is NEED_UNWRAP check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDHClientKeyExchange ECDH Public value: { 4, 200, 130, 16, 32, 193, 193, 142, 238, 144, 84, 216, 106, 167, 137, 137, 169, 3, 32, 22, 215, 170, 130, 128, 187, 227, 174, 171, 248, 79, 207, 204, 243, 159, 156, 208, 217, 194, 20, 61, 78, 175, 230, 181, 130, 144, 202, 116, 230, 140, 137, 79, 157, 214, 1, 32, 127, 148, 16, 36, 5, 248, 212, 123, 28 } SESSION KEYGEN: PreMaster Secret: 0000: A3 70 C0 DF 41 B1 F4 33 3D 89 5A 48 63 FA 35 6F .p..A..3=.ZHc.5o 0010: BE 9E D3 6E DC 1A 47 8B 80 D5 8C D8 EC DC BD 5C ...n..G........\\ CONNECTION KEYGEN: Client Nonce: 0000: BD 58 A3 98 50 75 49 29 5D C4 FB 61 A1 B7 93 55 .X..PuI)]..a...U 0010: 0B FE 9B 30 79 5E 14 26 7C 6E 13 50 C9 BD E8 60 ...0y^.&.n.P...` Server Nonce: 0000: 89 7F A6 C4 EE 9E F3 1B 3F F7 03 E2 39 AB 1B AC ........?...9... 0010: D5 68 13 C8 E7 01 C0 87 38 56 E1 9B BE 31 2A 2B .h......8V...1*+ Master Secret: 0000: 95 4B 8E 9F 89 B0 89 C4 18 B3 40 6D 07 11 0B B5 .K........@m.... 0010: 54 A9 C0 E6 28 EE CB 6A F3 0A 47 F9 66 70 89 56 T...(..j..G.fp.V 0020: C7 78 4A 71 DB 01 9D 5C 75 3F 42 10 4D 4A A9 7B .xJq...\\u?B.MJ.. Client MAC write Secret: 0000: 34 87 3F DA 14 29 6F E1 48 FA 0F 3E D2 F3 1A 6D 4.?..)o.H..>...m 0010: 62 69 36 09 bi6. Server MAC write Secret: 0000: 92 12 E1 D3 38 8A EF 41 15 DB A8 CD 05 F6 B6 AB ....8..A........ 0010: 56 1D 7C F4 V... Client write key: 0000: E5 9D 5E E8 2E 4C 83 89 8E 50 CC 32 91 98 30 EA ..^..L...P.2..0. 0010: AC 62 C3 25 84 9F A9 F2 .b.%.... Server write key: 0000: 58 97 88 83 C5 4F 8C 7A EB EF B4 E5 B5 2D 5D 5C X....O.z.....-]\\ 0010: 57 9B 85 0A 78 21 8D 82 W...x!.. ... no IV derived for this protocol Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] Server: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 62, 11, 255, 9, 231, 200, 198, 156, 231, 255, 50, 156 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] *** Finished verify_data: { 116, 232, 140, 239, 77, 240, 236, 170, 29, 32, 32, 148 } *** update handshake state: finished[20] %% Cached server session: [Session-2, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] pool-1-thread-1, WRITE: DTLSv1.2 Change Cipher Spec, length = 1 pool-1-thread-1, WRITE: DTLSv1.2 Handshake, length = 24 Server: Produce handshake packets: Handshake status is FINISHED, finish the loop Server: Handshake status is FINISHED after producing handshake packets, finish the loop pool-1-thread-2, READ: DTLSv1.2 Change Cipher Spec, length = 1 Client: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, READ: DTLSv1.2 Handshake, length = 56 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] Client: Receive DTLS records, handshake status is NEED_UNWRAP_AGAIN check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 116, 232, 140, 239, 77, 240, 236, 170, 29, 32, 32, 148 } *** %% Cached client session: [Session-3, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA] Client: Handshake status is FINISHED, finish the loop Client: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated protocol is DTLSv1.2 Server: Handshake finished, status is NOT_HANDSHAKING Client: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Server: Negotiated protocol is DTLSv1.2 Server: Negotiated cipher suite is TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA pool-1-thread-2, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-1, READ: DTLSv1.2 Application Data, length = 56 Received application data 0000: 48 69 20 53 65 72 76 65 72 2C 20 49 27 6D 20 43 Hi Server, I'm C 0010: 6C 69 65 6E 74 lient pool-1-thread-1, WRITE: DTLSv1.2 Application Data, length = 21 pool-1-thread-2, READ: DTLSv1.2 Application Data, length = 56 Received application data 0000: 48 69 20 43 6C 69 65 6E 74 2C 20 49 27 6D 20 53 Hi Client, I'm S 0010: 65 72 76 65 72 erver Client finished: Well done, client! Client finished: Well done, server! ----------System.err:(1/15)---------- STATUS:Passed. ----------rerun:(23/1853)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.6.jta TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA result: Passed. Execution successful #section:build ----------messages:(3/94)---------- command: build CipherSuite reason: Named class compiled on demand elapsed time (seconds): 0.0 result: Passed. All files up to date #section:main ----------messages:(176/9641)---------- command: main CipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 reason: User specified action: run main/othervm CipherSuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Mode: othervm [/othervm specified] Timeout information: Running jstack on process 55768 2016-06-13 19:25:34 Full thread dump Java HotSpot(TM) 64-Bit Server VM (9-ea+123-mach5-b651 mixed mode): "Attach Listener" #17 daemon prio=9 os_prio=31 tid=0x00007fdf1a016000 nid=0x550b waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "pool-1-thread-2" #16 prio=5 os_prio=31 tid=0x00007fdf1d003000 nid=0x7d03 runnable [0x0000000132d3c000] java.lang.Thread.State: RUNNABLE at java.net.PlainDatagramSocketImpl.receive0(java.base@9-ea/Native Method) - locked <0x00000007afa0b078> (a java.net.PlainDatagramSocketImpl) at java.net.AbstractPlainDatagramSocketImpl.receive(java.base@9-ea/AbstractPlainDatagramSocketImpl.java:180) - locked <0x00000007afa0b078> (a java.net.PlainDatagramSocketImpl) at java.net.DatagramSocket.receive(java.base@9-ea/DatagramSocket.java:814) - locked <0x00000007aeedb1a8> (a java.net.DatagramPacket) - locked <0x00000007afa0b010> (a java.net.DatagramSocket) at DTLSOverDatagram.handshake(DTLSOverDatagram.java:174) at DTLSOverDatagram.doClientSide(DTLSOverDatagram.java:121) at DTLSOverDatagram$ClientCallable.call(DTLSOverDatagram.java:629) at DTLSOverDatagram$ClientCallable.call(DTLSOverDatagram.java:612) at java.util.concurrent.FutureTask.run(java.base@9-ea/FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(java.base@9-ea/ThreadPoolExecutor.java:1158) at java.util.concurrent.ThreadPoolExecutor$Worker.run(java.base@9-ea/ThreadPoolExecutor.java:632) at java.lang.Thread.run(java.base@9-ea/Thread.java:843) "pool-1-thread-1" #15 prio=5 os_prio=31 tid=0x00007fdf1d812000 nid=0x7c07 runnable [0x0000000132c39000] java.lang.Thread.State: RUNNABLE at java.net.PlainDatagramSocketImpl.receive0(java.base@9-ea/Native Method) - locked <0x00000007afa09910> (a java.net.PlainDatagramSocketImpl) at java.net.AbstractPlainDatagramSocketImpl.receive(java.base@9-ea/AbstractPlainDatagramSocketImpl.java:180) - locked <0x00000007afa09910> (a java.net.PlainDatagramSocketImpl) at java.net.DatagramSocket.receive(java.base@9-ea/DatagramSocket.java:814) - locked <0x00000007aee68ba0> (a java.net.DatagramPacket) - locked <0x00000007afa01bf8> (a java.net.DatagramSocket) at DTLSOverDatagram.handshake(DTLSOverDatagram.java:174) at DTLSOverDatagram.doServerSide(DTLSOverDatagram.java:102) at DTLSOverDatagram$ServerCallable.call(DTLSOverDatagram.java:591) at DTLSOverDatagram$ServerCallable.call(DTLSOverDatagram.java:574) at java.util.concurrent.FutureTask.run(java.base@9-ea/FutureTask.java:266) at java.util.concurrent.ThreadPoolExecutor.runWorker(java.base@9-ea/ThreadPoolExecutor.java:1158) at java.util.concurrent.ThreadPoolExecutor$Worker.run(java.base@9-ea/ThreadPoolExecutor.java:632) at java.lang.Thread.run(java.base@9-ea/Thread.java:843) "MainThread" #14 prio=5 os_prio=31 tid=0x00007fdf1c13b800 nid=0x7403 waiting on condition [0x00000001329ad000] java.lang.Thread.State: WAITING (parking) at jdk.internal.misc.Unsafe.park(java.base@9-ea/Native Method) - parking to wait for <0x00000007afa1df10> (a java.util.concurrent.FutureTask) at java.util.concurrent.locks.LockSupport.park(java.base@9-ea/LockSupport.java:190) at java.util.concurrent.FutureTask.awaitDone(java.base@9-ea/FutureTask.java:450) at java.util.concurrent.FutureTask.get(java.base@9-ea/FutureTask.java:192) at DTLSOverDatagram.runTest(DTLSOverDatagram.java:550) at CipherSuite.main(CipherSuite.java:64) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(java.base@9-ea/Native Method) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(java.base@9-ea/NativeMethodAccessorImpl.java:62) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(java.base@9-ea/DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(java.base@9-ea/Method.java:533) at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:110) at java.lang.Thread.run(java.base@9-ea/Thread.java:843) "Service Thread" #12 daemon prio=9 os_prio=31 tid=0x00007fdf1c84a800 nid=0x7003 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Common-Cleaner" #11 daemon prio=8 os_prio=31 tid=0x00007fdf1c80b800 nid=0x6e03 in Object.wait() [0x00000001325e1000] java.lang.Thread.State: TIMED_WAITING (on object monitor) at java.lang.Object.wait(java.base@9-ea/Native Method) - waiting on <0x00000007aff3a958> (a java.lang.ref.ReferenceQueue$Lock) at java.lang.ref.ReferenceQueue.remove(java.base@9-ea/ReferenceQueue.java:151) - waiting to re-lock in wait() <0x00000007aff3a958> (a java.lang.ref.ReferenceQueue$Lock) at jdk.internal.ref.CleanerImpl.run(java.base@9-ea/CleanerImpl.java:148) at java.lang.Thread.run(java.base@9-ea/Thread.java:843) at jdk.internal.misc.InnocuousThread.run(java.base@9-ea/InnocuousThread.java:122) "Sweeper thread" #10 daemon prio=9 os_prio=31 tid=0x00007fdf1a002800 nid=0x6c03 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "C1 CompilerThread3" #9 daemon prio=9 os_prio=31 tid=0x00007fdf1b800000 nid=0x6a03 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "C2 CompilerThread2" #8 daemon prio=9 os_prio=31 tid=0x00007fdf198d6000 nid=0x6803 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "C2 CompilerThread1" #7 daemon prio=9 os_prio=31 tid=0x00007fdf1d802800 nid=0x6603 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "C2 CompilerThread0" #6 daemon prio=9 os_prio=31 tid=0x00007fdf1d004000 nid=0x6403 waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE No compile task "Signal Dispatcher" #5 daemon prio=9 os_prio=31 tid=0x00007fdf1a017000 nid=0x6203 runnable [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Reference Pending List Locker" #4 daemon prio=9 os_prio=31 tid=0x00007fdf1c806000 nid=0x590f waiting on condition [0x0000000000000000] java.lang.Thread.State: RUNNABLE "Finalizer" #3 daemon prio=8 os_prio=31 tid=0x00007fdf1b015800 nid=0x5103 in Object.wait() [0x00000001304ba000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait(java.base@9-ea/Native Method) - waiting on <0x00000007aff0d858> (a java.lang.ref.ReferenceQueue$Lock) at java.lang.ref.ReferenceQueue.remove(java.base@9-ea/ReferenceQueue.java:151) - waiting to re-lock in wait() <0x00000007aff0d858> (a java.lang.ref.ReferenceQueue$Lock) at java.lang.ref.ReferenceQueue.remove(java.base@9-ea/ReferenceQueue.java:172) at java.lang.ref.Finalizer$FinalizerThread.run(java.base@9-ea/Finalizer.java:216) "Reference Handler" #2 daemon prio=10 os_prio=31 tid=0x00007fdf1d000000 nid=0x4f03 in Object.wait() [0x00000001303b7000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait(java.base@9-ea/Native Method) - waiting on <0x00000007aff095c0> (a java.lang.ref.Reference$Lock) at java.lang.Object.wait(java.base@9-ea/Object.java:516) at java.lang.ref.Reference.tryHandlePending(java.base@9-ea/Reference.java:193) - waiting to re-lock in wait() <0x00000007aff095c0> (a java.lang.ref.Reference$Lock) at java.lang.ref.Reference$ReferenceHandler.run(java.base@9-ea/Reference.java:155) "main" #1 prio=5 os_prio=31 tid=0x00007fdf1b801800 nid=0x1a03 in Object.wait() [0x0000000111d00000] java.lang.Thread.State: WAITING (on object monitor) at java.lang.Object.wait(java.base@9-ea/Native Method) - waiting on <0x00000007afdbfab8> (a java.lang.Thread) at java.lang.Thread.join(java.base@9-ea/Thread.java:1352) - waiting to re-lock in wait() <0x00000007afdbfab8> (a java.lang.Thread) at java.lang.Thread.join(java.base@9-ea/Thread.java:1426) at com.sun.javatest.regtest.agent.MainWrapper.main(MainWrapper.java:74) "VM Thread" os_prio=31 tid=0x00007fdf1c014800 nid=0x4d03 runnable "GC Thread#0" os_prio=31 tid=0x00007fdf1c005800 nid=0x2303 runnable "GC Thread#1" os_prio=31 tid=0x00007fdf1c006000 nid=0x2503 runnable "GC Thread#2" os_prio=31 tid=0x00007fdf1c007000 nid=0x2703 runnable "GC Thread#3" os_prio=31 tid=0x00007fdf1c007800 nid=0x2903 runnable "GC Thread#4" os_prio=31 tid=0x00007fdf1b80a800 nid=0x2b03 runnable "GC Thread#5" os_prio=31 tid=0x00007fdf1c008000 nid=0x2d03 runnable "GC Thread#6" os_prio=31 tid=0x00007fdf1c008800 nid=0x2f03 runnable "GC Thread#7" os_prio=31 tid=0x00007fdf1c009800 nid=0x3103 runnable "G1 Main Marker" os_prio=31 tid=0x00007fdf1982f000 nid=0x4503 runnable "G1 Marker#0" os_prio=31 tid=0x00007fdf19830000 nid=0x4903 runnable "G1 Marker#1" os_prio=31 tid=0x00007fdf19830800 nid=0x4b03 runnable "G1 Refine#0" os_prio=31 tid=0x00007fdf19813800 nid=0x4103 runnable "G1 Refine#1" os_prio=31 tid=0x00007fdf19813000 nid=0x3f03 runnable "G1 Refine#2" os_prio=31 tid=0x00007fdf19812000 nid=0x3d03 runnable "G1 Refine#3" os_prio=31 tid=0x00007fdf19811800 nid=0x3b03 runnable "G1 Refine#4" os_prio=31 tid=0x00007fdf1a001800 nid=0x3903 runnable "G1 Refine#5" os_prio=31 tid=0x00007fdf1b005000 nid=0x3703 runnable "G1 Refine#6" os_prio=31 tid=0x00007fdf1b004800 nid=0x3503 runnable "G1 Refine#7" os_prio=31 tid=0x00007fdf1b003800 nid=0x3303 runnable "G1 Young RemSet Sampling" os_prio=31 tid=0x00007fdf19814800 nid=0x4303 runnable "VM Periodic Task Thread" os_prio=31 tid=0x00007fdf1b80c000 nid=0x7203 waiting on condition JNI global references: 768 --- Timeout information end. elapsed time (seconds): 601.073 ----------configuration:(3/68)---------- Boot Layer add exports: java.base/sun.security.util ALL-UNNAMED ----------System.out:(806/45322)---------- *** *** found key for : dummydsa found key for : dummydsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e25bdc47 08ab4746 5ccfcadc 43f7498e b898643b 3db0e846 8e88209c d7991e7c ab08847a 3d421981 ff60ff56 a34a8dfe 64ce20fc ce54e6bc b0c33229 bb6d2334 016b0218 509ffd96 628f3052 99ac5560 1dcff634 2d1c209f f8910410 c8b3d258 c57ee4de b2144616 94e5224b 96ac7452 68309dfd 2ac10f32 0c053d5d 3c994cca Validity: [From: Sun Mar 11 06:35:00 GMT 2007, To: Wed Mar 08 06:35:00 GMT 2017] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 45f3a314] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 6D 4F 83 51 FF 09 BF 5F E0 93 CF 8F 0,..mO.Q..._.... 0010: 41 A8 E0 A6 65 73 44 90 02 14 20 54 1C 94 F1 1E A...esD... T.... 0020: CD AB A7 35 00 AE 08 85 CB B1 B5 6E 2B 82 ...5.......n+. ] *** *** found key for : dummyecdsa *** found key for : dummyecdsa chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 32119735263438753215769144416929639972964508944328262499190042905234805981802 public y coord: 3600651129078063967820849048352833172726444486345461652651441633337421845182 parameters: secp256k1 (1.3.132.0.10) Validity: [From: Mon May 16 10:09:01 GMT 2016, To: Sat May 16 10:09:01 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399c1d] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 46 02 21 00 91 A6 1F 7F 32 20 49 DC E0 63 6C 0F.!.....2 I..cl 0010: 30 B2 09 7B C2 CE 58 16 81 D4 D6 6A 26 4F 40 21 0.....X....j&O@! 0020: 37 17 1C E4 A5 02 21 00 95 CA B5 33 D3 41 30 AB 7.....!....3.A0. 0030: 4F A5 B6 96 7D 02 87 D6 92 4F 7C 80 CB 81 BA BB O........O...... 0040: 04 04 F9 F4 54 BD 6A 9F ....T.j. ] *** *** found key for : dummy chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** chain [0] = [ [ Version: V1 Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25387337243209201248608750335976266523372906607780921308052278181667797543962519730723117377641112257468515130823517915666854784366178243167340157549901048556675631299867125103006885833785715502735071425840581052077090378410114652915324327451984356435001177538990317799650598707539958560850900178942546002569641128624150723025824512380974742542188668525457047440190719898376206259806433455933173148582437548088192779884104309816754872072643201331836939466502160718837454407501622879932617630986459202238334503440368413527419798599194541199640459058454999278262286894857696899907166301212706702535370268662765182464163 public exponent: 65537 Validity: [From: Mon May 16 10:06:38 GMT 2016, To: Sat May 16 10:06:38 GMT 2026] Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US SerialNumber: [ 57399b87] ] Algorithm: [SHA256withRSA] Signature: 0000: 59 15 A2 89 B4 DF F5 46 40 95 7A FE D9 99 81 30 Y......F@.z....0 0010: C3 0E 36 90 4E 51 A4 9B 7B 12 CD B3 A3 1A 84 19 ..6.NQ.......... 0020: A3 71 D1 30 39 0F A5 E7 10 1D 57 8C 55 10 3A 03 .q.09.....W.U.:. 0030: 86 ED 26 D4 97 83 5F 2E 92 5E 8E E6 62 43 36 97 ..&..._..^..bC6. 0040: DB BF BB 3E ED 45 2B 6E 12 23 3E B5 B0 83 69 C9 ...>.E+n.#>...i. 0050: 5B 5B F1 F9 40 E7 69 88 8C 7D BA 1F 3A 70 48 01 [[..@.i.....:pH. 0060: A6 4E 31 50 EE 6F 49 A2 C8 FF DB 92 2A 01 A4 4C .N1P.oI.....*..L 0070: D0 05 AE 3C B7 30 4D F0 7D CD 1C 77 99 ED 4B C7 ...<.0M....w..K. 0080: 1A F3 1A 1B 72 64 39 F5 26 19 6F D1 A2 D2 EF D8 ....rd9.&.o..... 0090: 37 DC AB A3 D4 70 18 32 FC 3B 50 66 A7 DF BD AE 7....p.2.;Pf.... 00A0: 7E 61 A2 BF E8 39 51 87 95 BC F6 30 DE 37 9A 84 .a...9Q....0.7.. 00B0: 99 12 22 1F 7A 05 BD 39 68 9A 5A A2 06 A8 13 97 ..".z..9h.Z..... 00C0: BE 81 06 A7 47 B1 37 E9 61 86 6A 27 23 7C DD 60 ....G.7.a.j'#..` 00D0: 20 74 8E CB 36 41 89 B7 13 52 16 A9 95 24 34 E8 t..6A...R...$4. 00E0: 37 CA E9 48 C6 98 77 15 8B C5 F9 C0 3F BD 35 65 7..H..w.....?.5e 00F0: A2 1A B9 54 1D C3 B0 2A E7 90 39 AA 6D 4D A6 97 ...T...*..9.mM.. ] *** adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: EC; Serial number: 0x57399c1d Valid from Mon May 16 10:09:01 GMT 2016 until Sat May 16 10:09:01 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: RSA; Serial number: 0x57399b87 Valid from Mon May 16 10:06:38 GMT 2016 until Sat May 16 10:06:38 GMT 2026 adding as trusted cert: Subject: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US Algorithm: DSA; Serial number: 0x45f3a314 Valid from Sun Mar 11 06:35:00 GMT 2007 until Wed Mar 08 06:35:00 GMT 2017 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring obsoleted cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring obsoleted cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring obsoleted cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring obsoleted cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 trigger seeding of SecureRandom trigger seeding of SecureRandom done seeding SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 No available cipher suite for DTLSv1.0 %% No cached client session Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for DTLSv1.0 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for DTLSv1.0 update handshake state: client_hello[1] upcoming handshake states: hello_verify_request[3] *** ClientHello, DTLSv1.2 RandomCookie: random_bytes = {30 B0 FF 2A BE FF 1B 3A 26 C7 85 8C B1 D5 3D 17 A0 0D 65 83 A8 BD A0 D2 FB ED 62 6C 20 83 B3 38} Session ID: {} cookie: { } Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension renegotiation_info, renegotiated_connection: *** pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Server: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP Server: Receive DTLS records, handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP Timeout signalled after 600 seconds Server: Warning: java.net.SocketTimeoutException: Receive timed out Client: Warning: java.net.SocketTimeoutException: Receive timed out Server: New handshake status is NEED_UNWRAP pool-1-thread-2, WRITE: DTLSv1.2 Handshake, length = 184 Server: Receive DTLS records, handshake status is NEED_UNWRAP Client: New handshake status is NEED_UNWRAP Client: Receive DTLS records, handshake status is NEED_UNWRAP ----------System.err:(0/0)---------- ----------rerun:(23/1857)*---------- HOME=/Users/mach5-one \\ PATH=/bin:/usr/bin \\ buildid=BUILD_ID \\ CLASSPATH=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/javatest.jar:/scratch/jenkins/workspace/mach5data/unpacked/jpg/infra/builddeps/jtreg-4.2/1.2/jtreg/lib/jtreg.jar \\ /scratch/jenkins/workspace/9-dev/jdk/bin/java \\ -Dtest.class.path.prefix=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS:/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.src.path=/scratch/jenkins/workspace/9-dev/jdk/test/javax/net/ssl/DTLS \\ -Dtest.classes=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.class.path=/scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/classes/10/javax/net/ssl/DTLS \\ -Dtest.vm.opts='-ea -esa -Xmx512m' \\ -Dtest.tool.vm.opts='-J-ea -J-esa -J-Xmx512m' \\ -Dtest.compiler.opts= \\ -Dtest.java.opts= \\ -Dtest.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dcompile.jdk=/scratch/jenkins/workspace/9-dev/jdk \\ -Dtest.timeout.factor=5.0 \\ -Dtest.modules=java.base/sun.security.util \\ -XaddExports:java.base/sun.security.util=ALL-UNNAMED \\ -ea \\ -esa \\ -Xmx512m \\ com.sun.javatest.regtest.agent.MainWrapper /scratch/jenkins/workspace/9-dev/testresults/macosx-x64/tier2/JTwork/jdk_test/javax/net/ssl/DTLS/CipherSuite.d/main.7.jta TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 result: Error. Program `/scratch/jenkins/workspace/9-dev/jdk/bin/java' timed out (timeout set to 600000ms, elapsed time was 601068ms). test result: Error. Program `/scratch/jenkins/workspace/9-dev/jdk/bin/java' timed out (timeout set to 600000ms, elapsed time was 601068ms).