network: Version checking for MazeApplet.jar, specified version is 1.0.0.0 network: Version checking for MazeUtil1.jar, specified version is 1.0* network: Version checking for MazeUtil2.jar, specified version is 1.0+ basic: Creating PluginEmbeddedFrame served by PlaceHolderServerName-1526 basic: Done creating PluginEmbeddedFrame basic: Added progress listener: sun.plugin.util.ProgressMonitorAdapter@6c1666d4 security: Expected Main URL: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar security: Accessing keys and certificate in Mozilla user profile: null security: JSS is not configured network: Cache entry not found [url: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar, version: 1.0.0.0] network: Connecting https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar?version-id=1.0.0.0 with proxy=DIRECT network: Connecting http://mossad.us.oracle.com:8443/ with proxy=DIRECT security: Loading SSL Root CA certificates from /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/lib/security/cacerts Java Plug-in 12.0.0.0 Using JRE version 9-ea+150 Java HotSpot(TM) 64-Bit Server VM JRE expiration date: 6/21/17, 12:00 AM User home directory = /Users/egtc ---------------------------------------------------- c: clear console window f: finalize objects on finalization queue g: garbage collect h: display this help message l: dump classloader list m: print memory usage o: trigger logging q: hide console r: reload policy configuration s: dump system and deployment properties t: dump thread list v: dump thread stack x: clear classloader cache 0-5: set trace level to ---------------------------------------------------- security: Loaded SSL Root CA certificates from /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/lib/security/cacerts security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Could not load blacklisted.certs file security: blacklisted.certs file contains no Algorithm property. security: Checking if SSL certificate is in Deployment permanent certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Invalid certificate from HTTPS server network: Cache entry not found [url: https://mossad.us.oracle.com, version: null] security: Saving certificates in Deployment session certificate store security: Saved certificates in Deployment session certificate store network: Checking for update at: https://javadl-esd-secure.oracle.com/update/securitypack.jar network: Connecting https://javadl-esd-secure.oracle.com/update/securitypack.jar with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Checking if SSL certificate is in Deployment permanent certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store network: Connecting http://g2.symcb.com/ with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: OCSP Response: GOOD network: Connecting http://gn.symcd.com/ with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: Failing over to CRLs: java.io.IOException: Server returned HTTP response code: 403 for URL: http://gn.symcd.com network: Cache entry not found [url: http://gn.symcb.com/gn.crl, version: null] network: Connecting http://gn.symcb.com/gn.crl with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 network: Downloading resource: http://gn.symcb.com/gn.crl Content-Length: -1 Content-Encoding: null network: Wrote URL http://gn.symcb.com/gn.crl to File /Users/egtc/Library/Application Support/Oracle/Java/Deployment/cache/6.0/13/30070f0d-443d4ca0-temp cache: Adding MemoryCache entry: http://gn.symcb.com/gn.crl security: Saving certificates in Deployment session certificate store security: Saved certificates in Deployment session certificate store network: Updating file at: /Users/egtc/Library/Application Support/Oracle/Java/Deployment/security/securitypack.jar from url: https://javadl-esd-secure.oracle.com/update/securitypack.jar security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: The certificate has expired, need to check timestamping info security: Timestamping info is available security: The certificate has expired, and is timestamped in valid period security: Start checking TSA certificate path security: Loading Root CA certificates from /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/lib/security/cacerts security: Loaded Root CA certificates from /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/lib/security/cacerts security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: Even though certificate has expired, it is timestamped in valid period and has valid TSA security: The OCSP support is enabled security: The CRL support is enabled network: Connecting http://ocsp.verisign.com/ with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: OCSP Response: GOOD network: Connecting http://ocsp.verisign.com/ with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: OCSP Response: GOOD network: Connecting http://sf.symcd.com/ with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 security: Failing over to CRLs: java.io.IOException: Server returned HTTP response code: 403 for URL: http://sf.symcd.com network: Cache entry not found [url: http://sf.symcb.com/sf.crl, version: null] network: Connecting http://sf.symcb.com/sf.crl with proxy=HTTP @ jp-proxy.jp.oracle.com/10.188.60.181:80 network: Downloading resource: http://sf.symcb.com/sf.crl Content-Length: -1 Content-Encoding: null network: Wrote URL http://sf.symcb.com/sf.crl to File /Users/egtc/Library/Application Support/Oracle/Java/Deployment/cache/6.0/46/2f37ccae-40c532fc-temp cache: Adding MemoryCache entry: http://sf.symcb.com/sf.crl security: Certificate validation succeeded using OCSP/CRL security: Saving certificates in Deployment session certificate store security: Saved certificates in Deployment session certificate store security: Verification succeeded for signed security pack file /Users/egtc/Library/Application Support/Oracle/Java/Deployment/security/securitypack.jar security: Cant read client certificate from cache, exception has been thrown. network: Cache entry not found [url: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar, version: 1.0.0.0] network: Connecting https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar?version-id=1.0.0.0 with proxy=DIRECT network: Connecting http://mossad.us.oracle.com:8443/ with proxy=DIRECT security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Cant read client certificate from cache, exception has been thrown. basic: Plugin2ClassLoader.addURL parent called for https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar basic: Plugin2ClassLoader.addURL parent called for https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil1.jar basic: Plugin2ClassLoader.addURL parent called for https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil2.jar network: Cache entry not found [url: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar, version: 1.0.0.0] network: Connecting https://mossad.us.oracle.com:8443/clientAuth/tests/MazeApplet.jar?version-id=1.0.0.0 with proxy=DIRECT network: Connecting http://mossad.us.oracle.com:8443/ with proxy=DIRECT security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Cant read client certificate from cache, exception has been thrown. java.net.SocketException: Socket closed at java.base/java.net.SocketOutputStream.socketWrite(Unknown Source) at java.base/java.net.SocketOutputStream.write(Unknown Source) at java.base/sun.security.ssl.SSLSocketOutputRecord.flush(Unknown Source) at java.base/sun.security.ssl.HandshakeOutStream.flush(Unknown Source) at java.base/sun.security.ssl.ClientHandshaker.serverHelloDone(Unknown Source) at java.base/sun.security.ssl.ClientHandshaker.processMessage(Unknown Source) at java.base/sun.security.ssl.Handshaker.processLoop(Unknown Source) at java.base/sun.security.ssl.Handshaker.processRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.processInputRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source) at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source) at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source) at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(Unknown Source) at jdk.plugin@9-ea/sun.plugin.PluginURLJarFileCallBack.connect(Unknown Source) at jdk.plugin@9-ea/sun.plugin.PluginURLJarFileCallBack.retrieve(Unknown Source) at java.base/sun.net.www.protocol.jar.URLJarFile.retrieve(Unknown Source) at java.base/sun.net.www.protocol.jar.URLJarFile.getJarFile(Unknown Source) at java.base/sun.net.www.protocol.jar.JarFileFactory.get(Unknown Source) at java.base/sun.net.www.protocol.jar.JarURLConnection.connect(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.connect(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.getJarFileWithVersionId(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.getJarFile(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.getJarFile(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.access$800(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.ensureOpen(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getResource(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.findClassHelper(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Applet2ClassLoader.findClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at java.base/java.lang.ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadCode(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2Manager.initAppletAdapter(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source) at java.base/java.lang.Thread.run(Unknown Source) network: Cache entry not found [url: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil1.jar, version: 1.0*] network: Connecting https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil1.jar?version-id=1.0* with proxy=DIRECT network: Connecting http://mossad.us.oracle.com:8443/ with proxy=DIRECT security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Cant read client certificate from cache, exception has been thrown. java.net.SocketException: Socket closed at java.base/java.net.SocketOutputStream.socketWrite(Unknown Source) at java.base/java.net.SocketOutputStream.write(Unknown Source) at java.base/sun.security.ssl.SSLSocketOutputRecord.flush(Unknown Source) at java.base/sun.security.ssl.HandshakeOutStream.flush(Unknown Source) at java.base/sun.security.ssl.ClientHandshaker.serverHelloDone(Unknown Source) at java.base/sun.security.ssl.ClientHandshaker.processMessage(Unknown Source) at java.base/sun.security.ssl.Handshaker.processLoop(Unknown Source) at java.base/sun.security.ssl.Handshaker.processRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.processInputRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source) at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source) at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source) at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(Unknown Source) at jdk.plugin@9-ea/sun.plugin.PluginURLJarFileCallBack.connect(Unknown Source) at jdk.plugin@9-ea/sun.plugin.PluginURLJarFileCallBack.retrieve(Unknown Source) at java.base/sun.net.www.protocol.jar.URLJarFile.retrieve(Unknown Source) at java.base/sun.net.www.protocol.jar.URLJarFile.getJarFile(Unknown Source) at java.base/sun.net.www.protocol.jar.JarFileFactory.get(Unknown Source) at java.base/sun.net.www.protocol.jar.JarURLConnection.connect(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.connect(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.getJarFileWithVersionId(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.net.protocol.jar.DeployURLConnection.getJarFile(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.getJarFile(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.access$800(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.ensureOpen(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$JarLoader.(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source) at jdk.deploy@9-ea/com.sun.deploy.security.DeployURLClassPath.getResource(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source) at java.base/java.security.AccessController.doPrivileged(Native Method) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.findClassHelper(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Applet2ClassLoader.findClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source) at java.base/java.lang.ClassLoader.loadClass(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2ClassLoader.loadCode(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2Manager.initAppletAdapter(Unknown Source) at jdk.plugin@9-ea/sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source) at java.base/java.lang.Thread.run(Unknown Source) network: Cache entry not found [url: https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil2.jar, version: 1.0+] network: Connecting https://mossad.us.oracle.com:8443/clientAuth/tests/MazeUtil2.jar?version-id=1.0%2B with proxy=DIRECT network: Connecting http://mossad.us.oracle.com:8443/ with proxy=DIRECT security: Obtain certificate collection in SSL Root CA certificate store security: Obtain certificate collection in SSL Root CA certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store