/data/app/jdk8/bin/java -agentlib:jdwp=transport=dt_socket,address=127.0.0.1:48776,suspend=y,server=n -Dfile.encoding=UTF-8 -classpath /data/app/jdk8/jre/lib/charsets.jar:/data/app/jdk8/jre/lib/deploy.jar:/data/app/jdk8/jre/lib/ext/cldrdata.jar:/data/app/jdk8/jre/lib/ext/dnsns.jar:/data/app/jdk8/jre/lib/ext/jaccess.jar:/data/app/jdk8/jre/lib/ext/jfxrt.jar:/data/app/jdk8/jre/lib/ext/localedata.jar:/data/app/jdk8/jre/lib/ext/nashorn.jar:/data/app/jdk8/jre/lib/ext/sunec.jar:/data/app/jdk8/jre/lib/ext/sunjce_provider.jar:/data/app/jdk8/jre/lib/ext/sunpkcs11.jar:/data/app/jdk8/jre/lib/ext/zipfs.jar:/data/app/jdk8/jre/lib/javaws.jar:/data/app/jdk8/jre/lib/jce.jar:/data/app/jdk8/jre/lib/jfr.jar:/data/app/jdk8/jre/lib/jfxswt.jar:/data/app/jdk8/jre/lib/jsse.jar:/data/app/jdk8/jre/lib/management-agent.jar:/data/app/jdk8/jre/lib/plugin.jar:/data/app/jdk8/jre/lib/resources.jar:/data/app/jdk8/jre/lib/rt.jar:/home/isc-hoa/git_checkout/sysp-2020/messaging-service/target/test-classes:/home/isc-hoa/git_checkout/sysp-2020/messaging-service/target/classes:/data/mavenrepo/ejpd-webservice-resources/sysp/sysp-messaging/sysp-messaging-v3-wslib/3.0.4/sysp-messaging-v3-wslib-3.0.4.jar:/data/mavenrepo/org/jvnet/jaxb2_commons/jaxb2-commons-lang/2.3/jaxb2-commons-lang-2.3.jar:/data/mavenrepo/isc-ejpd-library/ejpd-serverlib/6.025/ejpd-serverlib-6.025.jar:/data/mavenrepo/ejpd-webservice-resources/jfa/jfa-service-v2-wslib/2.100.0/jfa-service-v2-wslib-2.100.0.jar:/data/mavenrepo/org/apache/commons/commons-pool2/2.4.3/commons-pool2-2.4.3.jar:/home/isc-hoa/git_checkout/sysp-2020/security-lib/target/classes:/data/mavenrepo/org/slf4j/slf4j-api/1.7.25/slf4j-api-1.7.25.jar:/data/mavenrepo/org/apache/santuario/xmlsec/2.0.8/xmlsec-2.0.8.jar:/data/mavenrepo/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar:/data/mavenrepo/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar:/data/mavenrepo/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar:/data/mavenrepo/commons-codec/commons-codec/1.10/commons-codec-1.10.jar:/home/isc-hoa/git_checkout/sysp-2020/service-lib/target/classes:/data/mavenrepo/ejpd-base-resources/ejpd-base-servicetest-resources-v1/1.0.4.0/ejpd-base-servicetest-resources-v1-1.0.4.0.jar:/data/mavenrepo/ejpd-base-resources/ejpd-base-webservice-commons-resources-v1/1.3.2/ejpd-base-webservice-commons-resources-v1-1.3.2.jar:/data/mavenrepo/ejpd-webservice-resources/jfa/jfa-portalservice-v1-wslib/1.0-SNAPSHOT/jfa-portalservice-v1-wslib-1.0-20180118.145547-16.jar:/data/mavenrepo/com/migesok/jaxb-java-time-adapters/1.1.3/jaxb-java-time-adapters-1.1.3.jar:/data/mavenrepo/org/jvnet/jaxb2_commons/jaxb2-basics-runtime/1.11.1/jaxb2-basics-runtime-1.11.1.jar:/data/mavenrepo/isc-ejpd-library/ejpd-lib-spring-boot/0.99.0-SNAPSHOT/ejpd-lib-spring-boot-0.99.0-20180306.112411-96.jar:/data/mavenrepo/isc-ejpd-library/ejpd-security-spring-boot-starter/0.99.0-SNAPSHOT/ejpd-security-spring-boot-starter-0.99.0-20180305.153306-55.jar:/data/mavenrepo/adnovum/jcan-commons/1.0.3.0/jcan-commons-1.0.3.0.jar:/data/mavenrepo/adnovum/jcan-sectoken/1.2.4.0/jcan-sectoken-1.2.4.0.jar:/data/mavenrepo/org/springframework/spring-context-support/4.3.13.RELEASE/spring-context-support-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-security/1.5.10.RELEASE/spring-boot-starter-security-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-actuator/1.5.10.RELEASE/spring-boot-starter-actuator-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-actuator/1.5.10.RELEASE/spring-boot-actuator-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/spring-webmvc/4.3.13.RELEASE/spring-webmvc-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-aop/4.3.13.RELEASE/spring-aop-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-beans/4.3.13.RELEASE/spring-beans-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-context/4.3.13.RELEASE/spring-context-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-expression/4.3.13.RELEASE/spring-expression-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-tx/4.3.13.RELEASE/spring-tx-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/security/spring-security-core/4.2.3.RELEASE/spring-security-core-4.2.3.RELEASE.jar:/data/mavenrepo/aopalliance/aopalliance/1.0/aopalliance-1.0.jar:/data/mavenrepo/org/springframework/data/spring-data-commons/1.13.9.RELEASE/spring-data-commons-1.13.9.RELEASE.jar:/data/mavenrepo/org/slf4j/jcl-over-slf4j/1.7.25/jcl-over-slf4j-1.7.25.jar:/data/mavenrepo/javax/inject/javax.inject/1/javax.inject-1.jar:/data/mavenrepo/org/springframework/retry/spring-retry/1.2.2.RELEASE/spring-retry-1.2.2.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-aop/1.5.10.RELEASE/spring-boot-starter-aop-1.5.10.RELEASE.jar:/data/mavenrepo/org/aspectj/aspectjweaver/1.8.13/aspectjweaver-1.8.13.jar:/data/mavenrepo/com/fasterxml/jackson/datatype/jackson-datatype-hibernate5/2.8.10/jackson-datatype-hibernate5-2.8.10.jar:/data/mavenrepo/com/fasterxml/jackson/core/jackson-core/2.8.10/jackson-core-2.8.10.jar:/data/mavenrepo/javax/transaction/jta/1.1/jta-1.1.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-graphite/3.1.5/metrics-graphite-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-core/3.1.5/metrics-core-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-jvm/3.1.5/metrics-jvm-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-servlet/3.1.5/metrics-servlet-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-servlets/3.1.5/metrics-servlets-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-healthchecks/3.1.5/metrics-healthchecks-3.1.5.jar:/data/mavenrepo/io/dropwizard/metrics/metrics-json/3.1.5/metrics-json-3.1.5.jar:/data/mavenrepo/com/ryantenney/metrics/metrics-spring/3.0.3/metrics-spring-3.0.3.jar:/data/mavenrepo/com/codahale/metrics/metrics-core/3.0.2/metrics-core-3.0.2.jar:/data/mavenrepo/com/codahale/metrics/metrics-healthchecks/3.0.2/metrics-healthchecks-3.0.2.jar:/data/mavenrepo/com/codahale/metrics/metrics-annotation/3.0.2/metrics-annotation-3.0.2.jar:/data/mavenrepo/fr/ippon/spark/metrics/metrics-spark-reporter/1.2/metrics-spark-reporter-1.2.jar:/data/mavenrepo/com/zaxxer/HikariCP/2.5.1/HikariCP-2.5.1.jar:/data/mavenrepo/org/apache/commons/commons-lang3/3.5/commons-lang3-3.5.jar:/data/mavenrepo/org/apache/httpcomponents/httpclient/4.5.5/httpclient-4.5.5.jar:/data/mavenrepo/org/apache/httpcomponents/httpcore/4.4.9/httpcore-4.4.9.jar:/data/mavenrepo/org/hibernate/hibernate-core/5.0.12.Final/hibernate-core-5.0.12.Final.jar:/data/mavenrepo/org/hibernate/javax/persistence/hibernate-jpa-2.1-api/1.0.0.Final/hibernate-jpa-2.1-api-1.0.0.Final.jar:/data/mavenrepo/org/javassist/javassist/3.21.0-GA/javassist-3.21.0-GA.jar:/data/mavenrepo/antlr/antlr/2.7.7/antlr-2.7.7.jar:/data/mavenrepo/org/apache/geronimo/specs/geronimo-jta_1.1_spec/1.1.1/geronimo-jta_1.1_spec-1.1.1.jar:/data/mavenrepo/org/jboss/jandex/2.0.0.Final/jandex-2.0.0.Final.jar:/data/mavenrepo/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar:/data/mavenrepo/org/hibernate/common/hibernate-commons-annotations/5.0.1.Final/hibernate-commons-annotations-5.0.1.Final.jar:/data/mavenrepo/org/hibernate/hibernate-validator/5.3.6.Final/hibernate-validator-5.3.6.Final.jar:/data/mavenrepo/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar:/data/mavenrepo/com/fasterxml/classmate/1.3.4/classmate-1.3.4.jar:/data/mavenrepo/org/apache/tomcat/embed/tomcat-embed-core/8.5.27/tomcat-embed-core-8.5.27.jar:/data/mavenrepo/org/apache/tomcat/tomcat-annotations-api/8.5.27/tomcat-annotations-api-8.5.27.jar:/data/mavenrepo/org/springframework/security/extensions/spring-security-saml2-core/1.0.3.RELEASE/spring-security-saml2-core-1.0.3.RELEASE.jar:/data/mavenrepo/org/opensaml/opensaml/2.6.6/opensaml-2.6.6.jar:/data/mavenrepo/org/opensaml/openws/1.5.6/openws-1.5.6.jar:/data/mavenrepo/org/opensaml/xmltooling/1.4.6/xmltooling-1.4.6.jar:/data/mavenrepo/ca/juliusdavies/not-yet-commons-ssl/0.3.9/not-yet-commons-ssl-0.3.9.jar:/data/mavenrepo/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar:/data/mavenrepo/org/apache/velocity/velocity/1.7/velocity-1.7.jar:/data/mavenrepo/org/owasp/esapi/esapi/2.0.1/esapi-2.0.1.jar:/data/mavenrepo/org/slf4j/jul-to-slf4j/1.7.25/jul-to-slf4j-1.7.25.jar:/data/mavenrepo/org/springframework/security/spring-security-config/4.2.3.RELEASE/spring-security-config-4.2.3.RELEASE.jar:/data/mavenrepo/org/springframework/security/spring-security-web/4.2.4.RELEASE/spring-security-web-4.2.4.RELEASE.jar:/data/mavenrepo/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar:/data/mavenrepo/com/google/guava/guava/18.0/guava-18.0.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-starter-config/1.3.4.RELEASE/spring-cloud-starter-config-1.3.4.RELEASE.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-config-client/1.3.4.RELEASE/spring-cloud-config-client-1.3.4.RELEASE.jar:/data/mavenrepo/com/fasterxml/jackson/core/jackson-annotations/2.8.0/jackson-annotations-2.8.0.jar:/data/mavenrepo/com/fasterxml/jackson/core/jackson-databind/2.8.11/jackson-databind-2.8.11.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-starter-eureka/1.3.6.RELEASE/spring-cloud-starter-eureka-1.3.6.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-web/1.5.10.RELEASE/spring-boot-starter-web-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-tomcat/1.5.10.RELEASE/spring-boot-starter-tomcat-1.5.10.RELEASE.jar:/data/mavenrepo/org/apache/tomcat/embed/tomcat-embed-el/8.5.27/tomcat-embed-el-8.5.27.jar:/data/mavenrepo/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.27/tomcat-embed-websocket-8.5.27.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-netflix-core/1.3.6.RELEASE/spring-cloud-netflix-core-1.3.6.RELEASE.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.3.6.RELEASE/spring-cloud-netflix-eureka-client-1.3.6.RELEASE.jar:/data/mavenrepo/com/netflix/eureka/eureka-client/1.6.2/eureka-client-1.6.2.jar:/data/mavenrepo/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar:/data/mavenrepo/stax/stax-api/1.0.1/stax-api-1.0.1.jar:/data/mavenrepo/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar:/data/mavenrepo/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar:/data/mavenrepo/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar:/data/mavenrepo/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar:/data/mavenrepo/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar:/data/mavenrepo/com/google/code/gson/gson/2.8.2/gson-2.8.2.jar:/data/mavenrepo/org/apache/commons/commons-math/2.2/commons-math-2.2.jar:/data/mavenrepo/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar:/data/mavenrepo/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar:/data/mavenrepo/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar:/data/mavenrepo/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar:/data/mavenrepo/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar:/data/mavenrepo/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar:/data/mavenrepo/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar:/data/mavenrepo/com/google/inject/guice/4.1.0/guice-4.1.0.jar:/data/mavenrepo/com/netflix/eureka/eureka-core/1.6.2/eureka-core-1.6.2.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-starter-archaius/1.3.6.RELEASE/spring-cloud-starter-archaius-1.3.6.RELEASE.jar:/data/mavenrepo/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-starter-ribbon/1.3.6.RELEASE/spring-cloud-starter-ribbon-1.3.6.RELEASE.jar:/data/mavenrepo/com/netflix/ribbon/ribbon/2.2.2/ribbon-2.2.2.jar:/data/mavenrepo/com/netflix/ribbon/ribbon-transport/2.2.2/ribbon-transport-2.2.2.jar:/data/mavenrepo/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar:/data/mavenrepo/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar:/data/mavenrepo/com/netflix/hystrix/hystrix-core/1.5.12/hystrix-core-1.5.12.jar:/data/mavenrepo/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar:/data/mavenrepo/io/reactivex/rxnetty/0.4.20/rxnetty-0.4.20.jar:/data/mavenrepo/io/netty/netty-codec-http/4.1.5.Final/netty-codec-http-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-codec/4.1.5.Final/netty-codec-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-handler/4.1.5.Final/netty-handler-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-buffer/4.1.5.Final/netty-buffer-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-transport/4.1.5.Final/netty-transport-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-resolver/4.1.5.Final/netty-resolver-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-transport-native-epoll/4.1.5.Final/netty-transport-native-epoll-4.1.5.Final.jar:/data/mavenrepo/io/netty/netty-common/4.1.5.Final/netty-common-4.1.5.Final.jar:/data/mavenrepo/com/netflix/ribbon/ribbon-core/2.2.2/ribbon-core-2.2.2.jar:/data/mavenrepo/com/netflix/ribbon/ribbon-httpclient/2.2.2/ribbon-httpclient-2.2.2.jar:/data/mavenrepo/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar:/data/mavenrepo/com/netflix/ribbon/ribbon-loadbalancer/2.2.2/ribbon-loadbalancer-2.2.2.jar:/data/mavenrepo/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar:/data/mavenrepo/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar:/data/mavenrepo/com/netflix/ribbon/ribbon-eureka/2.2.2/ribbon-eureka-2.2.2.jar:/data/mavenrepo/com/thoughtworks/xstream/xstream/1.4.9/xstream-1.4.9.jar:/data/mavenrepo/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar:/data/mavenrepo/xpp3/xpp3_min/1.1.4c/xpp3_min-1.1.4c.jar:/data/mavenrepo/de/codecentric/spring-boot-admin-starter-client/1.5.5/spring-boot-admin-starter-client-1.5.5.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter/1.5.10.RELEASE/spring-boot-starter-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-logging/1.5.10.RELEASE/spring-boot-starter-logging-1.5.10.RELEASE.jar:/data/mavenrepo/ch/qos/logback/logback-classic/1.1.11/logback-classic-1.1.11.jar:/data/mavenrepo/ch/qos/logback/logback-core/1.1.11/logback-core-1.1.11.jar:/data/mavenrepo/org/slf4j/log4j-over-slf4j/1.7.25/log4j-over-slf4j-1.7.25.jar:/data/mavenrepo/org/yaml/snakeyaml/1.17/snakeyaml-1.17.jar:/data/mavenrepo/org/springframework/spring-web/4.3.13.RELEASE/spring-web-4.3.13.RELEASE.jar:/data/mavenrepo/org/jolokia/jolokia-core/1.3.7/jolokia-core-1.3.7.jar:/data/mavenrepo/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-starter/1.2.5.RELEASE/spring-cloud-starter-1.2.5.RELEASE.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-context/1.2.5.RELEASE/spring-cloud-context-1.2.5.RELEASE.jar:/data/mavenrepo/org/springframework/security/spring-security-crypto/4.2.3.RELEASE/spring-security-crypto-4.2.3.RELEASE.jar:/data/mavenrepo/org/springframework/cloud/spring-cloud-commons/1.2.5.RELEASE/spring-cloud-commons-1.2.5.RELEASE.jar:/data/mavenrepo/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar:/data/mavenrepo/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar:/data/mavenrepo/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-data-jpa/1.5.10.RELEASE/spring-boot-starter-data-jpa-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-jdbc/1.5.10.RELEASE/spring-boot-starter-jdbc-1.5.10.RELEASE.jar:/data/mavenrepo/org/apache/tomcat/tomcat-jdbc/8.5.27/tomcat-jdbc-8.5.27.jar:/data/mavenrepo/org/apache/tomcat/tomcat-juli/8.5.27/tomcat-juli-8.5.27.jar:/data/mavenrepo/org/springframework/spring-jdbc/4.3.13.RELEASE/spring-jdbc-4.3.13.RELEASE.jar:/data/mavenrepo/org/hibernate/hibernate-entitymanager/5.0.12.Final/hibernate-entitymanager-5.0.12.Final.jar:/data/mavenrepo/javax/transaction/javax.transaction-api/1.2/javax.transaction-api-1.2.jar:/data/mavenrepo/org/springframework/data/spring-data-jpa/1.11.9.RELEASE/spring-data-jpa-1.11.9.RELEASE.jar:/data/mavenrepo/org/springframework/spring-orm/4.3.13.RELEASE/spring-orm-4.3.13.RELEASE.jar:/data/mavenrepo/org/springframework/spring-aspects/4.3.13.RELEASE/spring-aspects-4.3.13.RELEASE.jar:/data/mavenrepo/mysql/mysql-connector-java/5.1.45/mysql-connector-java-5.1.45.jar:/data/mavenrepo/org/flywaydb/flyway-core/3.2.1/flyway-core-3.2.1.jar:/data/mavenrepo/oracle/jdbc/ojdbc8/12.2.0.1.0/ojdbc8-12.2.0.1.0.jar:/data/mavenrepo/org/jadira/usertype/usertype.core/5.0.0.GA/usertype.core-5.0.0.GA.jar:/data/mavenrepo/org/jadira/usertype/usertype.spi/5.0.0.GA/usertype.spi-5.0.0.GA.jar:/data/mavenrepo/org/hibernate/hibernate-java8/5.0.12.Final/hibernate-java8-5.0.12.Final.jar:/data/mavenrepo/org/jboss/logging/jboss-logging/3.3.1.Final/jboss-logging-3.3.1.Final.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-frontend-jaxws/3.2.1/cxf-rt-frontend-jaxws-3.2.1.jar:/data/mavenrepo/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar:/data/mavenrepo/org/ow2/asm/asm/5.2/asm-5.2.jar:/data/mavenrepo/org/apache/cxf/cxf-core/3.2.1/cxf-core-3.2.1.jar:/data/mavenrepo/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar:/data/mavenrepo/org/apache/ws/xmlschema/xmlschema-core/2.2.2/xmlschema-core-2.2.2.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-bindings-soap/3.2.1/cxf-rt-bindings-soap-3.2.1.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-wsdl/3.2.1/cxf-rt-wsdl-3.2.1.jar:/data/mavenrepo/wsdl4j/wsdl4j/1.6.3/wsdl4j-1.6.3.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-databinding-jaxb/3.2.1/cxf-rt-databinding-jaxb-3.2.1.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-bindings-xml/3.2.1/cxf-rt-bindings-xml-3.2.1.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-frontend-simple/3.2.1/cxf-rt-frontend-simple-3.2.1.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-ws-addr/3.2.1/cxf-rt-ws-addr-3.2.1.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-ws-policy/3.2.1/cxf-rt-ws-policy-3.2.1.jar:/data/mavenrepo/org/apache/neethi/neethi/3.1.0/neethi-3.1.0.jar:/data/mavenrepo/org/apache/cxf/cxf-rt-transports-http/3.2.1/cxf-rt-transports-http-3.2.1.jar:/data/mavenrepo/commons-io/commons-io/2.5/commons-io-2.5.jar:/home/isc-hoa/git_checkout/sysp-2020/project-resources/sysp-biometrics-enrolment-types-v1/target/classes:/data/mavenrepo/commons-lang/commons-lang/2.6/commons-lang-2.6.jar:/data/mavenrepo/joda-time/joda-time/2.9.9/joda-time-2.9.9.jar:/data/mavenrepo/org/springframework/boot/spring-boot-devtools/1.5.10.RELEASE/spring-boot-devtools-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot/1.5.10.RELEASE/spring-boot-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-autoconfigure/1.5.10.RELEASE/spring-boot-autoconfigure-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-starter-test/1.5.10.RELEASE/spring-boot-starter-test-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-test/1.5.10.RELEASE/spring-boot-test-1.5.10.RELEASE.jar:/data/mavenrepo/org/springframework/boot/spring-boot-test-autoconfigure/1.5.10.RELEASE/spring-boot-test-autoconfigure-1.5.10.RELEASE.jar:/data/mavenrepo/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar:/data/mavenrepo/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar:/data/mavenrepo/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar:/data/mavenrepo/org/assertj/assertj-core/2.6.0/assertj-core-2.6.0.jar:/data/mavenrepo/org/mockito/mockito-core/2.12.0/mockito-core-2.12.0.jar:/data/mavenrepo/net/bytebuddy/byte-buddy/1.7.9/byte-buddy-1.7.9.jar:/data/mavenrepo/net/bytebuddy/byte-buddy-agent/1.7.9/byte-buddy-agent-1.7.9.jar:/data/mavenrepo/org/objenesis/objenesis/2.6/objenesis-2.6.jar:/data/mavenrepo/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar:/data/mavenrepo/org/hamcrest/hamcrest-library/1.3/hamcrest-library-1.3.jar:/data/mavenrepo/org/skyscreamer/jsonassert/1.4.0/jsonassert-1.4.0.jar:/data/mavenrepo/com/vaadin/external/google/android-json/0.0.20131108.vaadin1/android-json-0.0.20131108.vaadin1.jar:/data/mavenrepo/org/springframework/spring-core/4.3.14.RELEASE/spring-core-4.3.14.RELEASE.jar:/data/mavenrepo/org/springframework/spring-test/4.3.13.RELEASE/spring-test-4.3.13.RELEASE.jar:/data/mavenrepo/org/hsqldb/hsqldb/2.3.5/hsqldb-2.3.5.jar:/data/mavenrepo/org/dbunit/dbunit/2.4.9/dbunit-2.4.9.jar:/data/mavenrepo/commons-collections/commons-collections/3.2.2/commons-collections-3.2.2.jar:/data/mavenrepo/junit/junit/4.12/junit-4.12.jar:/home/isc-hoa/idea-IU-162.1121.32/lib/idea_rt.jar ch.ejpd.sysp.messaging.TLSTester Connected to the target VM, address: '127.0.0.1:48776', transport: 'socket' >>> Run 0 trustStore is: /data/app/jdk8/jre/lib/security/cacerts trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Algorithm: RSA; Serial number: 0xc3517 Valid from Mon Jun 21 06:00:00 CEST 1999 until Mon Jun 22 06:00:00 CEST 2020 adding as trusted cert: Subject: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Algorithm: EC; Serial number: 0xa68b79290000000050d091f9 Valid from Tue Dec 18 16:25:36 CET 2012 until Fri Dec 18 16:55:36 CET 2037 adding as trusted cert: Subject: CN=SecureTrust CA, O=SecureTrust Corporation, C=US Issuer: CN=SecureTrust CA, O=SecureTrust Corporation, C=US Algorithm: RSA; Serial number: 0xcf08e5c0816a5ad427ff0eb271859d0 Valid from Tue Nov 07 20:31:18 CET 2006 until Mon Dec 31 20:40:55 CET 2029 adding as trusted cert: Subject: CN=Swiss Government Regular CA 01, OU=Certification Authorities, OU=Services, O=Admin, C=CH Issuer: CN=Swiss Government Root CA II, OU=Certification Authorities, OU=Services, O=The Federal Authorities of the Swiss Confederation, C=CH Algorithm: RSA; Serial number: 0x915a3c407822c0fb6f37b63d0b8d74e7 Valid from Wed Feb 16 10:00:00 CET 2011 until Sun Feb 16 09:59:59 CET 2025 adding as trusted cert: Subject: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 30 06:20:49 CEST 2003 until Sat Sep 30 06:20:49 CEST 2023 adding as trusted cert: Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x83be056904246b1a1756ac95991c74a Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031 adding as trusted cert: Subject: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x445734245b81899b35f2ceb82b3b5ba726f07528 Valid from Thu Jan 12 19:59:32 CET 2012 until Sun Jan 12 19:59:32 CET 2042 adding as trusted cert: Subject: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x59b1b579e8e2132e23907bda777755c Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038 adding as trusted cert: Subject: CN=Swiss Government SSL CA 01, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH Issuer: CN=Swiss Government Root CA II, OU=Certification Authorities, OU=Services, O=The Federal Authorities of the Swiss Confederation, C=CH Algorithm: RSA; Serial number: 0x25b924cbbd7a6dc0eed745854d4660de Valid from Thu Jun 05 15:07:38 CEST 2014 until Tue Jun 05 15:07:38 CEST 2029 adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x18acb56afd69b6153a636cafdafac4a1 Valid from Mon Nov 27 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP Issuer: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP Algorithm: RSA; Serial number: 0x0 Valid from Fri May 29 07:00:39 CEST 2009 until Tue May 29 07:00:39 CEST 2029 adding as trusted cert: Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6 Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028 adding as trusted cert: Subject: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW Issuer: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW Algorithm: RSA; Serial number: 0x15c8bd65475cafb897005ee406d2bc9d Valid from Mon Dec 20 03:31:27 CET 2004 until Wed Dec 20 03:31:27 CET 2034 adding as trusted cert: Subject: CN=AffirmTrust Commercial, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Commercial, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x7777062726a9b17c Valid from Fri Jan 29 15:06:06 CET 2010 until Tue Dec 31 15:06:06 CET 2030 adding as trusted cert: Subject: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL Issuer: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL Algorithm: RSA; Serial number: 0x444c0 Valid from Wed Oct 22 14:07:37 CEST 2008 until Mon Dec 31 13:07:37 CET 2029 adding as trusted cert: Subject: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US Issuer: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US Algorithm: RSA; Serial number: 0x50946cec18ead59c4dd597ef758fa0ad Valid from Mon Nov 01 18:14:04 CET 2004 until Mon Jan 01 06:37:19 CET 2035 adding as trusted cert: Subject: CN=Sonera Class2 CA, O=Sonera, C=FI Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI Algorithm: RSA; Serial number: 0x1d Valid from Fri Apr 06 09:29:40 CEST 2001 until Tue Apr 06 09:29:40 CEST 2021 adding as trusted cert: Subject: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US Issuer: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Tue May 28 08:00:00 CEST 2002 until Thu Nov 19 21:43:00 CET 2037 adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Algorithm: EC; Serial number: 0x3cb2f4480a00e2feeb243b5e603ec36b Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Algorithm: RSA; Serial number: 0x35def4cf Valid from Sat Aug 22 18:41:51 CEST 1998 until Wed Aug 22 18:41:51 CEST 2018 adding as trusted cert: Subject: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: EC; Serial number: 0x1f47afaa62007050544c019e9b63992a Valid from Thu Mar 06 01:00:00 CET 2008 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: CN=ISRG Root X1, O=Internet Security Research Group, C=US Issuer: CN=ISRG Root X1, O=Internet Security Research Group, C=US Algorithm: RSA; Serial number: 0x8210cfb0d240e3594463e0bb63828b00 Valid from Thu Jun 04 13:04:38 CEST 2015 until Mon Jun 04 13:04:38 CEST 2035 adding as trusted cert: Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x2ac5c266a0b409b8f0b79f2ae462577 Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031 adding as trusted cert: Subject: CN=Swiss Government Public Trust Standard CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH Issuer: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH Algorithm: RSA; Serial number: 0x51fc89492b4968c09ec3216076b65663 Valid from Wed May 11 10:36:42 CEST 2016 until Sun May 11 10:36:42 CEST 2031 adding as trusted cert: Subject: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Thu Mar 04 06:00:00 CET 2004 until Sun Mar 04 06:00:00 CET 2029 adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 Algorithm: RSA; Serial number: 0x4000000000121585308a2 Valid from Wed Mar 18 11:00:00 CET 2009 until Sun Mar 18 11:00:00 CET 2029 adding as trusted cert: Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Algorithm: RSA; Serial number: 0x20000b9 Valid from Fri May 12 20:46:00 CEST 2000 until Tue May 13 01:59:00 CEST 2025 adding as trusted cert: Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA Issuer: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA Algorithm: RSA; Serial number: 0x67c8e1e8e3be1cbdfc913b8ea6238749 Valid from Wed Jan 01 01:00:00 CET 1997 until Sat Jan 02 00:59:59 CET 2021 adding as trusted cert: Subject: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: RSA; Serial number: 0x1 Valid from Thu Jan 01 01:00:00 CET 2004 until Mon Jan 01 00:59:59 CET 2029 adding as trusted cert: Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Jun 29 19:39:16 CEST 2004 until Thu Jun 29 19:39:16 CEST 2034 adding as trusted cert: Subject: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Issuer: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 30 18:13:43 CEST 2003 until Wed Sep 30 18:13:44 CEST 2037 adding as trusted cert: Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362afe650afd Valid from Fri Jul 09 20:10:42 CEST 1999 until Tue Jul 09 20:19:22 CEST 2019 adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57 Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Algorithm: RSA; Serial number: 0x40000000001154b5ac394 Valid from Tue Sep 01 14:00:00 CEST 1998 until Fri Jan 28 13:00:00 CET 2028 adding as trusted cert: Subject: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362de0b35f1b Valid from Fri Jul 09 20:31:20 CEST 1999 until Tue Jul 09 20:40:36 CEST 2019 adding as trusted cert: Subject: CN=AffirmTrust Networking, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Networking, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x7c4f04391cd4992d Valid from Fri Jan 29 15:08:24 CET 2010 until Tue Dec 31 15:08:24 CET 2030 adding as trusted cert: Subject: CN=AffirmTrust Premium, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Premium, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x6d8c1446b1a60aee Valid from Fri Jan 29 15:10:36 CET 2010 until Mon Dec 31 15:10:36 CET 2040 adding as trusted cert: Subject: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH Issuer: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH Algorithm: RSA; Serial number: 0xfb1f0b422ba8413e57d1ee2a6e5a4fbb Valid from Fri Apr 15 09:00:00 CEST 2016 until Mon Apr 15 08:59:59 CEST 2041 adding as trusted cert: Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE Algorithm: RSA; Serial number: 0x20000bf Valid from Wed May 17 16:01:00 CEST 2000 until Sun May 18 01:59:00 CEST 2025 adding as trusted cert: Subject: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US Issuer: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Tue May 28 08:00:00 CEST 2002 until Tue Sep 29 16:08:00 CEST 2037 adding as trusted cert: Subject: CN=LuxTrust Global Root, O=LuxTrust s.a., C=LU Issuer: CN=LuxTrust Global Root, O=LuxTrust s.a., C=LU Algorithm: RSA; Serial number: 0xbb8 Valid from Thu Mar 17 10:51:37 CET 2011 until Wed Mar 17 10:51:37 CET 2021 adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x15ac6e9419b2794b41f627a9c3180f1f Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037 adding as trusted cert: Subject: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Issuer: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Algorithm: RSA; Serial number: 0xa3da427ea4b1aeda Valid from Fri Aug 01 14:29:50 CEST 2008 until Sat Jul 31 14:29:50 CEST 2038 adding as trusted cert: Subject: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH Issuer: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH Algorithm: RSA; Serial number: 0x4f1bd42f54bb2f4b Valid from Wed Oct 25 10:32:46 CEST 2006 until Sat Oct 25 10:32:46 CEST 2036 adding as trusted cert: Subject: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Algorithm: RSA; Serial number: 0x4a538c28 Valid from Tue Jul 07 19:25:54 CEST 2009 until Sat Dec 07 18:55:54 CET 2030 adding as trusted cert: Subject: CN=eap0012_CA, OU=EJPD, O=Admin, C=CH Issuer: CN=eap0012_CA, OU=EJPD, O=Admin, C=CH Algorithm: RSA; Serial number: 0xd1f5afe6d47d5f89 Valid from Fri May 13 11:24:45 CEST 2016 until Thu May 08 11:24:45 CEST 2036 adding as trusted cert: Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0xce7e0e517d846fe8fe560fc1bf03039 Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031 adding as trusted cert: Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Jun 29 19:06:20 CEST 2004 until Thu Jun 29 19:06:20 CEST 2034 adding as trusted cert: Subject: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 12:48:38 CEST 2000 until Sat May 30 12:48:38 CEST 2020 adding as trusted cert: Subject: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Issuer: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Algorithm: RSA; Serial number: 0x1 Valid from Wed Oct 01 12:29:56 CEST 2008 until Sun Oct 02 01:59:59 CEST 2033 adding as trusted cert: Subject: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: EC; Serial number: 0x55556bcf25ea43535c3a40fd5ab4572 Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038 adding as trusted cert: Subject: CN=Admin-CC-Root01, O=admin, C=ch Issuer: CN=Admin-CC-Root01, O=admin, C=ch Algorithm: RSA; Serial number: 0x6ffcffac88cb9b34454e628858b0fc2 Valid from Thu Nov 29 11:26:03 CET 2012 until Sat Nov 29 11:36:01 CET 2042 adding as trusted cert: Subject: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Algorithm: RSA; Serial number: 0x44be0c8b500024b411d336252567c989 Valid from Fri Jul 09 19:28:50 CEST 1999 until Tue Jul 09 19:36:58 CEST 2019 adding as trusted cert: Subject: CN=Class 2 Primary CA, O=Certplus, C=FR Issuer: CN=Class 2 Primary CA, O=Certplus, C=FR Algorithm: RSA; Serial number: 0x85bd4bf3d8dae369f694d75fc3a54423 Valid from Wed Jul 07 19:05:00 CEST 1999 until Sun Jul 07 01:59:59 CEST 2019 adding as trusted cert: Subject: CN=Swiss Government Root CA II, OU=Certification Authorities, OU=Services, O=The Federal Authorities of the Swiss Confederation, C=CH Issuer: CN=Swiss Government Root CA II, OU=Certification Authorities, OU=Services, O=The Federal Authorities of the Swiss Confederation, C=CH Algorithm: RSA; Serial number: 0xe9f1799a5b13d9ccbec06eba3f00e69 Valid from Wed Feb 16 10:00:00 CET 2011 until Fri Feb 16 09:59:59 CET 2035 adding as trusted cert: Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x23456 Valid from Tue May 21 06:00:00 CEST 2002 until Sat May 21 06:00:00 CEST 2022 adding as trusted cert: Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH Issuer: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH Algorithm: RSA; Serial number: 0x4eb200670c035d4f Valid from Wed Oct 25 10:36:00 CEST 2006 until Sat Oct 25 10:36:00 CEST 2036 adding as trusted cert: Subject: CN=Admin-CCE-Intra01, DC=intra, DC=admin, DC=ch Issuer: CN=Admin-CC-Root01, O=admin, C=ch Algorithm: RSA; Serial number: 0x6132de9c000000000002 Valid from Thu Nov 29 14:57:23 CET 2012 until Mon Nov 29 15:07:23 CET 2027 adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 Algorithm: EC; Serial number: 0x605949e0262ebb55f90a778a71f94ad86c Valid from Tue Nov 13 01:00:00 CET 2012 until Tue Jan 19 04:14:07 CET 2038 adding as trusted cert: Subject: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x6170cb498c5f984529e7b0a6d9505b7a Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038 adding as trusted cert: Subject: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US Issuer: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US Algorithm: RSA; Serial number: 0xa0142800000014523cf467c00000002 Valid from Thu Jan 16 18:53:32 CET 2014 until Mon Jan 16 18:53:32 CET 2034 adding as trusted cert: Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Algorithm: RSA; Serial number: 0x3863def8 Valid from Fri Dec 24 18:50:51 CET 1999 until Tue Jul 24 16:15:12 CEST 2029 adding as trusted cert: Subject: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Algorithm: RSA; Serial number: 0x344ed55720d5edec49f42fce37db2b6d Valid from Fri Nov 17 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038 adding as trusted cert: Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x8b5b75568454850b00cfaf3848ceb1a4 Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: EC; Serial number: 0x2f80fe238c0e220f486712289187acb3 Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US Algorithm: RSA; Serial number: 0x456b5054 Valid from Mon Nov 27 21:23:42 CET 2006 until Fri Nov 27 21:53:42 CET 2026 adding as trusted cert: Subject: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0xb931c3ad63967ea6723bfc3af9af44b Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038 adding as trusted cert: Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Algorithm: RSA; Serial number: 0x10020 Valid from Tue Jun 11 12:46:39 CEST 2002 until Fri Jun 11 12:46:39 CEST 2027 adding as trusted cert: Subject: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 12:44:50 CEST 2000 until Sat May 30 12:44:50 CEST 2020 adding as trusted cert: Subject: CN=DST Root CA X3, O=Digital Signature Trust Co. Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. Algorithm: RSA; Serial number: 0x44afb080d6a327ba893039862ef8406b Valid from Sat Sep 30 23:12:19 CEST 2000 until Thu Sep 30 16:01:15 CEST 2021 adding as trusted cert: Subject: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO Issuer: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO Algorithm: RSA; Serial number: 0x2 Valid from Tue Oct 26 10:38:03 CEST 2010 until Fri Oct 26 10:38:03 CEST 2040 adding as trusted cert: Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE Algorithm: RSA; Serial number: 0x983f4 Valid from Thu Nov 05 09:50:46 CET 2009 until Mon Nov 05 09:50:46 CET 2029 adding as trusted cert: Subject: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: EC; Serial number: 0xba15afa1ddfa0b54944afcd24a06cec Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038 adding as trusted cert: Subject: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH Issuer: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH Algorithm: RSA; Serial number: 0xbb401c43f55e4fb0 Valid from Wed Oct 25 10:30:35 CEST 2006 until Sat Oct 25 10:30:35 CEST 2036 adding as trusted cert: Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Algorithm: EC; Serial number: 0x5c8b99c55a94c5d27156decd8980cc26 Valid from Mon Feb 01 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US Issuer: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US Algorithm: RSA; Serial number: 0xa0142800000014523c844b500000002 Valid from Thu Jan 16 19:12:23 CET 2014 until Mon Jan 16 19:12:23 CET 2034 adding as trusted cert: Subject: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x509 Valid from Fri Nov 24 19:27:00 CET 2006 until Mon Nov 24 19:23:33 CET 2031 adding as trusted cert: Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE Algorithm: RSA; Serial number: 0x26 Valid from Fri Jul 09 14:11:00 CEST 1999 until Wed Jul 10 01:59:00 CEST 2019 adding as trusted cert: Subject: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE Issuer: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE Algorithm: RSA; Serial number: 0x983f3 Valid from Thu Nov 05 09:35:58 CET 2009 until Mon Nov 05 09:35:58 CET 2029 adding as trusted cert: Subject: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x78585f2ead2c194be3370735341328b596d46593 Valid from Thu Jan 12 18:27:44 CET 2012 until Sun Jan 12 18:27:44 CET 2042 adding as trusted cert: Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x3f691e819cf09a4af373ffb948a2e4dd Valid from Mon Jan 29 01:00:00 CET 1996 until Thu Aug 03 01:59:59 CEST 2028 adding as trusted cert: Subject: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Algorithm: RSA; Serial number: 0x1fd6d30fca3ca51a81bbc640e35032d Valid from Mon Feb 01 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0xb92f60cc889fa17a4609b85b706c8aaf Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028 adding as trusted cert: Subject: C=CH, O=Admin, OU=EJPD, CN=EJPDIDMCA Issuer: C=CH, O=Admin, OU=EJPD, CN=EJPDIDMCA Algorithm: RSA; Serial number: 0x4519c5ebc4ce5470 Valid from Wed Aug 07 17:55:49 CEST 2013 until Thu Dec 31 16:55:49 CET 2037 adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 Algorithm: RSA; Serial number: 0x400000000010f8626e60d Valid from Fri Dec 15 09:00:00 CET 2006 until Wed Dec 15 09:00:00 CET 2021 adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x18dad19e267de8bb4a2158cdcc6b3b4a Valid from Wed Nov 08 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036 adding as trusted cert: Subject: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x5c6 Valid from Fri Nov 24 20:11:23 CET 2006 until Mon Nov 24 20:06:44 CET 2031 adding as trusted cert: Subject: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038 adding as trusted cert: Subject: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Issuer: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Algorithm: RSA; Serial number: 0x1e9e28e848f2e5efc37c4a1e5a1867b6 Valid from Fri Jun 24 10:38:14 CEST 2011 until Wed Jun 25 09:38:14 CEST 2031 adding as trusted cert: Subject: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d Valid from Thu Jan 12 21:26:32 CET 2012 until Sun Jan 12 21:26:32 CET 2042 adding as trusted cert: Subject: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT Issuer: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT Algorithm: RSA; Serial number: 0x570a119742c4e3cc Valid from Thu Sep 22 13:22:02 CEST 2011 until Sun Sep 22 13:22:02 CEST 2030 adding as trusted cert: Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x3c9131cb1ff6d01b0e9ab8d044bf12be Valid from Mon Jan 29 01:00:00 CET 1996 until Thu Aug 03 01:59:59 CEST 2028 adding as trusted cert: Subject: CN=Swiss Government Public Trust EV CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH Issuer: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH Algorithm: RSA; Serial number: 0x638b4bd14277a667fc4a80afe96a95ba Valid from Wed May 11 13:33:59 CEST 2016 until Sun May 11 13:33:59 CEST 2031 adding as trusted cert: Subject: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x3ab6508b Valid from Mon Mar 19 19:33:33 CET 2001 until Wed Mar 17 19:33:33 CET 2021 adding as trusted cert: Subject: CN=Class 3P Primary CA, O=Certplus, C=FR Issuer: CN=Class 3P Primary CA, O=Certplus, C=FR Algorithm: RSA; Serial number: 0xbf5cdbb6f21c6ec04deb7a023b36e879 Valid from Wed Jul 07 19:10:00 CEST 1999 until Sun Jul 07 01:59:59 CEST 2019 adding as trusted cert: Subject: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO Issuer: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO Algorithm: RSA; Serial number: 0x2 Valid from Tue Oct 26 10:28:58 CEST 2010 until Fri Oct 26 10:28:58 CEST 2040 adding as trusted cert: Subject: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP Issuer: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP Algorithm: RSA; Serial number: 0x0 Valid from Wed Jun 06 04:12:32 CEST 2007 until Sat Jun 06 04:12:32 CEST 2037 adding as trusted cert: Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Algorithm: RSA; Serial number: 0x59e3 Valid from Mon Jun 21 06:00:00 CEST 1999 until Mon Jun 22 06:00:00 CEST 2020 adding as trusted cert: Subject: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US Issuer: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US Algorithm: EC; Serial number: 0x35fc265cd9844fc93d263d579baed756 Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x401ac46421b31321030ebbe4121ac51d Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037 adding as trusted cert: Subject: C=CH, O=Admin, OU=EJPD, CN=EJPDIDMCA2 Issuer: C=CH, O=Admin, OU=EJPD, CN=EJPDIDMCA2 Algorithm: RSA; Serial number: 0x11c8972e8409b941 Valid from Thu Dec 17 16:22:18 CET 2015 until Tue Dec 01 16:22:18 CET 2037 adding as trusted cert: Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 12:38:31 CEST 2000 until Sat May 30 12:38:31 CEST 2020 adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4 Algorithm: EC; Serial number: 0x2a38a41c960a04de42b228a50be8349802 Valid from Tue Nov 13 01:00:00 CET 2012 until Tue Jan 19 04:14:07 CET 2038 adding as trusted cert: Subject: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Issuer: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Algorithm: RSA; Serial number: 0xc9cdd3e9d57d23ce Valid from Fri Aug 01 14:31:40 CEST 2008 until Sat Jul 31 14:31:40 CEST 2038 adding as trusted cert: Subject: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Issuer: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Algorithm: RSA; Serial number: 0x600197b746a7eab4b49ad64b2ff790fb Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037 adding as trusted cert: Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: RSA; Serial number: 0x4caaf9cadb636fe01ff74ed85b03869d Valid from Tue Jan 19 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038 adding as trusted cert: Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Algorithm: RSA; Serial number: 0x1a5 Valid from Thu Aug 13 02:29:00 CEST 1998 until Tue Aug 14 01:59:00 CEST 2018 adding as trusted cert: Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Algorithm: RSA; Serial number: 0x36122296c5e338a520a1d25f4cd70954 Valid from Thu Aug 01 02:00:00 CEST 1996 until Sat Jan 02 00:59:59 CET 2021 adding as trusted cert: Subject: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US Algorithm: EC; Serial number: 0x7497258ac73f7a54 Valid from Fri Jan 29 15:20:24 CET 2010 until Mon Dec 31 15:20:24 CET 2040 adding as trusted cert: Subject: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Issuer: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Algorithm: RSA; Serial number: 0x1 Valid from Wed Oct 01 12:40:14 CEST 2008 until Sun Oct 02 01:59:59 CEST 2033 adding as trusted cert: Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x4cc7eaaa983e71d39310f83d3a899192 Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028 adding as trusted cert: Subject: CN=KEYNECTIS ROOT CA, OU=ROOT, O=KEYNECTIS, C=FR Issuer: CN=KEYNECTIS ROOT CA, OU=ROOT, O=KEYNECTIS, C=FR Algorithm: RSA; Serial number: 0x1121bc276c5547af584eefd4ced629b2a285 Valid from Tue May 26 02:00:00 CEST 2009 until Tue May 26 02:00:00 CEST 2020 adding as trusted cert: Subject: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x33af1e6a711a9a0bb2864b11d09fae5 Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038 keyStore is : /data/app/sysp/localconfig/clientAuthKeystore.jks keyStore type is : jks keyStore provider is : init keystore init keymanager of type SunX509 *** found key for : tuser-sysp-scu0000a chain [0] = [ [ Version: V3 Subject: CN=TUSER-SYSP-SCU0000A, OU=Systemplattform eDokumente, O=Admin, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25027028182467694683913544237864432927282293074107818818807877030342847025279370734421683740554850424603261221390884946917720650812037177195092324408255542817305102504561912559357382998882681995977594048854862774935856446333282718263266097364335331528566453171905299121492184294388240012767009265273349666578909993284706766338539099718470792098345416589669101833977550740610552957432532910777688674819680872156485206333249722165631496690963418223753492714815880450556778994104167461657295422152540978158216242899021588749185064992353328162973038301095198406145123154145338064733148394967347800016877457018421517446681 public exponent: 65537 Validity: [From: Fri Jan 20 10:59:40 CET 2017, To: Mon Jan 20 10:59:40 CET 2020] Issuer: CN=Swiss Government Regular CA 01, OU=Certification Authorities, OU=Services, O=Admin, C=CH SerialNumber: [ 4ea774a2 4ec4163f 3d3681d4 83eca550] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/RegularCA01.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/ocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 4D 77 B5 E4 EF 6D 9C C3 9B A0 3A 87 E1 A6 EE 08 Mw...m....:..... 0010: A7 39 E7 8B .9.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/RegularCA01.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Regular%20CA%2001,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.22.23] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 32 31 5F 31 2E 70 64 66 3_21_1.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 B0 1A 81 AD 54 68 65 20 70 75 72 70 6F 73 0.....The purpos 0010: 65 20 6F 66 20 74 68 69 73 20 63 65 72 74 69 66 e of this certif 0020: 69 63 61 74 65 20 69 73 20 73 6F 6C 65 6C 79 20 icate is solely 0030: 69 6E 74 65 6E 64 65 64 20 66 6F 72 20 73 79 73 intended for sys 0040: 74 65 6D 20 70 6C 61 74 66 6F 72 6D 20 65 44 6F tem platform eDo 0050: 6B 75 6D 65 6E 74 65 20 61 70 70 6C 69 63 61 74 kumente applicat 0060: 69 6F 6E 20 75 73 61 67 65 73 2E 20 54 68 65 20 ion usages. The 0070: 73 75 62 6A 65 63 74 20 69 73 20 61 20 74 65 63 subject is a tec 0080: 68 6E 69 63 61 6C 20 75 73 65 72 20 72 65 66 65 hnical user refe 0090: 72 65 6E 63 65 64 20 69 6E 20 74 68 65 20 64 61 renced in the da 00A0: 74 61 62 61 73 65 20 6F 66 20 49 53 43 2D 45 4A tabase of ISC-EJ 00B0: 50 44 2E PD. ]] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ emailProtection clientAuth 1.3.6.1.4.1.311.20.2.2 1.3.6.1.4.1.311.10.3.4 ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [8]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: juerg.blaser@isc-ejpd.admin.ch ] [9]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: E1 88 99 91 11 01 56 40 8D F1 E6 AE 0D F5 96 6E ......V@.......n 0010: A7 87 4F 18 ..O. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 5E 6D 26 5C 80 B1 22 63 63 09 F2 1A 73 72 24 E9 ^m&\.."cc...sr$. 0010: 1A 0D 78 A9 6E 93 D0 32 32 75 70 00 51 58 60 0D ..x.n..22up.QX`. 0020: 62 3D AE F8 89 30 C6 4C 37 C1 E9 56 A9 B6 9C 97 b=...0.L7..V.... 0030: F4 46 2E 82 7E C2 F4 8E E4 08 0E B9 E3 89 62 40 .F............b@ 0040: EC D1 B3 B3 FB 14 0C 48 AD B3 02 B2 4D A4 D5 3A .......H....M..: 0050: 21 63 0B C9 E1 E1 E8 87 A0 49 22 2E 4D D1 89 CA !c.......I".M... 0060: 97 CA DD A2 94 DC D0 F8 EA 3C 11 84 E1 58 C2 4A .........<...X.J 0070: A0 6E 16 2E 0D 0E 32 CC 91 72 39 B1 79 E0 B4 3B .n....2..r9.y..; 0080: 6B 68 B5 18 D0 CE B1 CA 1A 45 43 D2 C0 90 BA 94 kh.......EC..... 0090: 85 24 36 0C D9 1A 60 05 E2 78 ED 53 BF 8B 42 FD .$6...`..x.S..B. 00A0: 0B 9F 88 3C 5F 5B 04 17 68 D9 70 04 DE 29 3A 8D ...<_[..h.p..):. 00B0: 4B E6 D5 4F 5C 16 C2 ED EC C3 EF 3E E4 D2 94 7B K..O\......>.... 00C0: 18 50 78 60 DF 67 6C 7C 18 76 8C 8C 9B E7 A7 5C .Px`.gl..v.....\ 00D0: AC 4D 31 A8 17 C6 48 CE 46 9A D0 23 F7 B6 3F 74 .M1...H.F..#..?t 00E0: 76 CC FE 86 32 E2 0C B6 DF 91 72 19 B6 C3 1E 90 v...2.....r..... 00F0: 44 33 74 62 83 86 82 9F 51 72 84 31 43 7D 5D 9F D3tb....Qr.1C.]. 0100: C4 9F 22 71 79 FE D9 B9 31 C7 EB F8 74 BB 98 64 .."qy...1...t..d 0110: 80 34 03 A4 D1 06 1F 3D 94 3B 62 BC 94 01 E0 57 .4.....=.;b....W 0120: 4C 69 EB 3E 2A 43 18 AF A5 82 8B 6C 07 59 21 41 Li.>*C.....l.Y!A 0130: F1 7D 1C 16 51 31 DC 39 EA 4C 0A 08 BA A3 BD A8 ....Q1.9.L...... 0140: 16 61 E4 10 D2 5C 58 D8 C1 1E 71 E6 22 F8 8F 84 .a...\X...q."... 0150: BB 2E E4 86 E8 5A C4 CA 43 66 7D F4 9E DF CB 74 .....Z..Cf.....t 0160: AD 6A 36 00 D8 58 D4 4F 00 20 AD 50 33 69 68 80 .j6..X.O. .P3ih. 0170: E3 9D 74 8A 67 0D EA 2C FA 86 52 85 B1 EC 72 39 ..t.g..,..R...r9 0180: C8 7B A9 03 FC BF DF 00 FD 57 E5 61 E3 75 49 83 .........W.a.uI. 0190: B7 29 A0 5D 15 72 C5 EA 0D EE EF 43 D5 A6 68 E9 .).].r.....C..h. 01A0: EC 37 22 DF A6 F4 75 5F 64 E7 F4 87 04 0C 79 FB .7"...u_d.....y. 01B0: FB F5 D7 89 36 DB 77 C8 F7 04 CE 2C 16 3D 89 E0 ....6.w....,.=.. 01C0: 71 57 7C 04 47 84 36 26 5C F6 60 20 BB 9B 95 9C qW..G.6&\.` .... 01D0: F0 AE AE 9F 65 BE F7 A8 00 52 2A 16 9E 78 D5 67 ....e....R*..x.g 01E0: 75 4B BB CF 1A DD 30 CC 78 2B BE E0 0B C5 12 8B uK....0.x+...... 01F0: F1 8C 12 AE A7 C0 FF 26 0E 49 33 2C 42 79 32 37 .......&.I3,By27 ] *** trigger seeding of SecureRandom done seeding SecureRandom Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called main, the previous server name in SNI (type=host_name (0), value=portal-test.ejpd.admin.ch) was replaced with (type=host_name (0), value=portal-test.ejpd.admin.ch) Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1504069851 bytes = { 99, 103, 61, 59, 59, 172, 151, 35, 157, 109, 217, 144, 65, 255, 83, 254, 101, 95, 183, 32, 98, 161, 100, 225, 141, 121, 213, 128 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension server_name, server_name: [type=host_name (0), value=portal-test.ejpd.admin.ch] *** main, WRITE: TLSv1.2 Handshake, length = 243 main, READ: TLSv1.2 Handshake, length = 93 *** ServerHello, TLSv1.2 RandomCookie: GMT: -1623851052 bytes = { 186, 25, 155, 243, 158, 219, 166, 113, 33, 185, 141, 15, 202, 36, 209, 60, 177, 121, 97, 72, 145, 204, 115, 67, 57, 223, 97, 41 } Session ID: {51, 148, 69, 44, 250, 130, 69, 51, 53, 229, 193, 36, 128, 192, 29, 78, 132, 155, 142, 207, 112, 171, 151, 46, 150, 223, 137, 229, 230, 87, 113, 208} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension server_name, server_name: Extension renegotiation_info, renegotiated_connection: Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] *** %% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] ** TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 main, READ: TLSv1.2 Handshake, length = 2020 *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=portal-test.ejpd.admin.ch, OU=Servers, O=Bundesamt fuer Informatik und Telekommunikation, L=Bern, ST=BE, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 24109167904437433945253508844342763413441845728208183254647005819933868198780296728577640607958357822408250558015383202085282842403482866361947874340498940788692215286838967482023754570995759820949362508793327877831065057670470861041451731272193094175058185897869086760581452374585244852633837402338192501727415524341078979419280212850657629638907508258572452503360478646158645100860112882483193416936550820627048860062106314761897031068761917793776773387785924043891026693008945863920194239795211639452716392625588820439122532450621258878585060338342149673355731074965264742710524889861054322551199697492763878869543 public exponent: 65537 Validity: [From: Mon Dec 04 15:45:32 CET 2017, To: Wed Dec 04 15:45:32 CET 2019] Issuer: CN=Swiss Government Public Trust Standard CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH SerialNumber: [ 63255dbd 2700e2fc f19dec0a 7578d0f0] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/PTSTCA02BC.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/bcocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 84 58 4E 87 2D A5 B0 4E 49 85 BB BC 01 71 E6 B4 .XN.-..NI....q.. 0010: C7 55 FF 10 .U.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/PTSTCA02.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Public%20Trust%20Standard%20CA%2002,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.62.14] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 36 31 5F 30 2E 70 64 66 3_61_0.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 A4 0C 81 A1 52 65 6C 69 61 6E 63 65 20 6F 0.....Reliance o 0010: 6E 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 n the SG Root CA 0020: 20 49 49 49 20 43 65 72 74 69 66 69 63 61 74 65 III Certificate 0030: 20 62 79 20 61 6E 79 20 70 61 72 74 79 20 61 73 by any party as 0040: 73 75 6D 65 73 20 61 63 63 65 70 74 61 6E 63 65 sumes acceptance 0050: 20 6F 66 20 74 68 65 20 74 68 65 6E 20 61 70 70 of the then app 0060: 6C 69 63 61 62 6C 65 20 73 74 61 6E 64 61 72 64 licable standard 0070: 20 74 65 72 6D 73 20 61 6E 64 20 63 6F 6E 64 69 terms and condi 0080: 74 69 6F 6E 73 20 6F 66 20 75 73 65 20 61 6E 64 tions of use and 0090: 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 20 the SG Root CA 00A0: 49 49 49 20 43 50 53 III CPS ]] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [8]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: portal-test.ejpd.admin.ch ] [9]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: B0 40 07 04 E3 74 03 59 AA 66 52 78 D3 8F CE 73 .@...t.Y.fRx...s 0010: 21 8E 02 79 !..y ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0A 2D 6F 0F 55 C2 C4 3A 59 40 A2 81 B4 7C 44 A9 .-o.U..:Y@....D. 0010: F6 62 76 2F A1 0D 8D 4B 28 DC 58 D6 99 AD A1 38 .bv/...K(.X....8 0020: 91 A6 33 8F 9B C6 D2 8D 98 A7 4B 58 46 33 DA 2F ..3.......KXF3./ 0030: 34 BC 32 C8 A0 DF 28 EE C3 08 B6 78 07 5D B3 27 4.2...(....x.].' 0040: 48 F7 C9 C4 96 29 5A 10 E7 BB 80 D0 D5 7C CB 13 H....)Z......... 0050: 1E 54 CC 24 1B E1 F0 A6 FF 02 80 FD D4 88 21 D9 .T.$..........!. 0060: 36 E1 4C 18 EB 65 6A 25 23 1F 83 A7 55 61 82 C9 6.L..ej%#...Ua.. 0070: 1F E8 48 50 27 91 46 21 A3 58 F0 D4 FB 25 17 59 ..HP'.F!.X...%.Y 0080: 40 95 C0 CC 83 51 F7 DF 5F 7F D2 00 D6 F7 51 FB @....Q.._.....Q. 0090: 38 C4 8A D3 64 A5 0E AB F2 A1 29 A5 99 BB A8 C0 8...d.....)..... 00A0: 2D 14 ED E5 74 34 5C 8F 7B 70 F2 19 2E 17 76 62 -...t4\..p....vb 00B0: 29 71 91 46 6E AD FE 4F 13 B7 F3 C0 D4 0A 48 7A )q.Fn..O......Hz 00C0: 3D 6E A5 0E 00 DB CD 0F 66 C4 19 99 92 3A DA 62 =n......f....:.b 00D0: 42 79 17 1C 95 C2 AC 2E C0 05 38 75 45 7A AE 50 By........8uEz.P 00E0: 8E CF D3 55 B5 95 FD 07 B4 23 C2 67 C1 15 9C C2 ...U.....#.g.... 00F0: 43 B9 21 6D 1A C8 F1 E2 2E 3E 40 AC A3 E1 4E 42 C.!m.....>@...NB 0100: 31 CB CA 85 4A 9B F5 21 95 20 29 72 04 6E AE 1A 1...J..!. )r.n.. 0110: E9 04 D2 9E 16 9A 54 A0 E5 6F AA 67 6B 1E 89 7C ......T..o.gk... 0120: D9 0F 5B 82 56 17 06 78 0E 2B 8C 66 6F A2 74 13 ..[.V..x.+.fo.t. 0130: D2 14 37 D1 D1 DA 57 8C 3B 48 67 19 3D A2 AF 76 ..7...W.;Hg.=..v 0140: BD AB 62 FB A3 1B 1E 35 18 EC 72 03 80 9A 11 13 ..b....5..r..... 0150: 3C 2A D9 5F 0D 47 60 32 BA F1 96 45 3A E3 E2 D5 <*._.G`2...E:... 0160: CD 38 AC 81 21 8F 06 B6 BB C4 37 36 DF A0 11 BA .8..!.....76.... 0170: 4D D8 61 B3 4F AF E4 04 F6 5E B1 99 53 28 3D B7 M.a.O....^..S(=. 0180: 40 A1 EA 6B 54 F0 76 58 18 C7 0B 8B BF 52 0A D0 @..kT.vX.....R.. 0190: 9F 25 B3 0D 5B 33 C8 9D 20 9F DA 02 EA CF 12 82 .%..[3.. ....... 01A0: 82 18 6A D9 2B 51 AA BC 2E 5E 22 AB 7F 76 F7 D7 ..j.+Q...^"..v.. 01B0: 52 EF 06 03 47 D7 0B 43 4E 83 88 A7 33 54 71 9C R...G..CN...3Tq. 01C0: 5E 2F 3D E3 09 BF 54 66 94 37 22 3B 28 AA 75 F4 ^/=...Tf.7";(.u. 01D0: B6 4C F3 9F ED 4E 58 83 75 74 34 13 C9 B3 A0 08 .L...NX.ut4..... 01E0: 76 0E 18 72 DA FB C5 38 2E A5 20 B8 79 AD E0 26 v..r...8.. .y..& 01F0: 51 21 08 5B 32 1F E9 90 FB 3B 51 15 54 D5 22 8A Q!.[2....;Q.T.". ] *** Found trusted certificate: [ [ Version: V3 Subject: CN=Swiss Government Public Trust Standard CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 685030365976306227664770318750740055344262204363356489255200488126509027249780393480152864502079712591299086481583066718124997413065144941016976402995248841742873018338953833528091501640845003736986907323199933259442382032249941471222721298593830087627421951904142281784859991606199159436034251871128659464076704777826812850206320977942118734271613656876323197005486810160880335083703267372132894769474408886144461152404934157789579323380315204238874948052404550618414408891460786661785789722427748773630869667116014075529961288790262968939130590039393639686046124007735970521753063559612996046877550099638496160209002222125707394509436944658283310622941479773678664893840600319520931184326211910170022464891782188982820354161664578519645213143561901957585895416676721122741278086311046678867348741779914605643877086173379061840301443047017125731495367225812341965936171706393997817947465533551378079508519071245733796893538104510192433803881855625212534567419601711885984431423964482738786349536277691205661351201444074718234290357888994049445157777862216444875206522897011987932465352506151147605745946036172958308441499991951459951730459222349606464989902606719302708618175148080051476456284218863757216853990487613420598444880511 public exponent: 65537 Validity: [From: Wed May 11 10:36:42 CEST 2016, To: Sun May 11 10:36:42 CEST 2031] Issuer: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH SerialNumber: [ 51fc8949 2b4968c0 9ec32160 76b65663] Certificate Extensions: 7 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/RootCAIII.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/ocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 07 EB 8E AA 71 CB 27 A5 BB C7 31 60 BE ED 1F CF ....q.'...1`.... 0010: A0 33 C4 E6 .3.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:0 ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/RootCAIII.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Root%20CA%20III,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.61.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 36 31 5F 30 2E 70 64 66 3_61_0.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 A4 1A 81 A1 52 65 6C 69 61 6E 63 65 20 6F 0.....Reliance o 0010: 6E 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 n the SG Root CA 0020: 20 49 49 49 20 43 65 72 74 69 66 69 63 61 74 65 III Certificate 0030: 20 62 79 20 61 6E 79 20 70 61 72 74 79 20 61 73 by any party as 0040: 73 75 6D 65 73 20 61 63 63 65 70 74 61 6E 63 65 sumes acceptance 0050: 20 6F 66 20 74 68 65 20 74 68 65 6E 20 61 70 70 of the then app 0060: 6C 69 63 61 62 6C 65 20 73 74 61 6E 64 61 72 64 licable standard 0070: 20 74 65 72 6D 73 20 61 6E 64 20 63 6F 6E 64 69 terms and condi 0080: 74 69 6F 6E 73 20 6F 66 20 75 73 65 20 61 6E 64 tions of use and 0090: 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 20 the SG Root CA 00A0: 49 49 49 20 43 50 53 III CPS ]] ] ] [6]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 84 58 4E 87 2D A5 B0 4E 49 85 BB BC 01 71 E6 B4 .XN.-..NI....q.. 0010: C7 55 FF 10 .U.. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 75 22 F0 9D 51 C2 83 18 E7 FF 92 50 2F 0E A6 2E u"..Q......P/... 0010: C4 21 A5 F4 26 36 DC FB 1E DB CC 65 2A 7B D8 25 .!..&6.....e*..% 0020: 52 AF 04 79 77 34 80 4B BA CB 93 81 14 BF 7B 4F R..yw4.K.......O 0030: 71 14 EE E9 A8 13 36 74 83 1F EA D7 4A 56 1F F5 q.....6t....JV.. 0040: BE 0D 4F D2 04 A6 EE BF 16 F1 89 2A 67 A4 FA B4 ..O........*g... 0050: 2B 7C 1F 66 4D 26 C0 A0 D0 84 82 C2 62 3F 05 D0 +..fM&......b?.. 0060: 55 67 DB 18 9F 1F 7D DD 91 42 96 7A 83 94 8F 1F Ug.......B.z.... 0070: E0 49 2F AD 15 5A 18 89 45 30 17 6A D2 A4 35 F5 .I/..Z..E0.j..5. 0080: C2 DE 9A 3A B3 1A 89 A0 38 46 FA CD D7 6C F5 8A ...:....8F...l.. 0090: 60 40 64 E5 93 AD 01 24 6C AF 96 1D DC BD 37 29 `@d....$l.....7) 00A0: 1B F0 66 E0 52 17 26 F5 AC 4A FB B0 1C CB 4B 7C ..f.R.&..J....K. 00B0: C8 C7 03 0D 87 72 FF 6B 72 58 32 E7 E7 25 15 C3 .....r.krX2..%.. 00C0: 57 39 8E A2 1D 8F 97 6F 46 99 67 67 C3 36 38 9A W9.....oF.gg.68. 00D0: 5C E1 ED 9F FC 3E 99 23 AF 98 AB 4F C2 C8 C7 8D \....>.#...O.... 00E0: 96 C4 CE F5 2E 65 C3 61 8F B3 0E 64 38 D9 C2 6F .....e.a...d8..o 00F0: E7 14 40 E0 3E 3E CA 46 9F F5 E6 55 04 A6 5C FF ..@.>>.F...U..\. 0100: 02 B8 DA 39 09 00 75 36 50 86 E6 A9 D2 A3 E1 A1 ...9..u6P....... 0110: 2A 33 50 3C 13 D4 C7 0E E5 6F D2 A1 C4 A8 41 8E *3P<.....o....A. 0120: A8 67 E3 64 3E 8A 39 99 5D D7 D3 26 70 C5 8D 2F .g.d>.9.]..&p../ 0130: 9F AE 16 4D 80 AA 30 EF 57 7F 1D CF 9F 84 D8 1A ...M..0.W....... 0140: F3 A2 24 16 69 3B 8F DE A0 8D 48 26 A0 61 C4 B7 ..$.i;....H&.a.. 0150: E7 93 74 D3 80 12 0A 3F 9D 79 C0 74 EB 3C 27 6F ..t....?.y.t.<'o 0160: E5 3B 47 53 14 84 D4 A2 BE 85 02 97 59 53 B5 EA .;GS........YS.. 0170: 06 00 62 1B 90 C8 AC A8 99 A4 E0 C7 CF EA A8 F6 ..b............. 0180: EB 3E 85 AC B7 89 EF BA A5 64 1A F3 1A 0E 12 EA .>.......d...... 0190: F9 9A 48 5C AC 51 DB 23 98 FA AC 6B 60 08 D0 A5 ..H\.Q.#...k`... 01A0: EE 20 A1 30 CB 57 B9 A8 C9 7E BC 4D 0D 74 14 11 . .0.W.....M.t.. 01B0: 8B 9D 1B B0 05 C8 FF 7B 81 86 F2 1E 3D 8F F6 EA ............=... 01C0: 2A EF 0E BF 8B 68 5C 7A 0E 75 7B 26 0F 69 D1 29 *....h\z.u.&.i.) 01D0: C2 97 7F E2 88 0C C9 02 AD D9 26 11 EE BB 66 90 ..........&...f. 01E0: C2 49 19 4A F2 30 52 9C 6B 72 A7 7F BF CE 90 8D .I.J.0R.kr...... 01F0: B4 C3 F4 2D 3A 07 35 DB 35 57 1E 8C 96 2A 27 FF ...-:.5.5W...*'. ] main, READ: TLSv1.2 Handshake, length = 333 *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 21520938335261728745816979548122030212294929862029024105469847945650494490571 public y coord: 82242084156261223174603998030699840215225212370257347710239924905567517868587 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) main, READ: TLSv1.2 Handshake, length = 4 *** ServerHelloDone *** ECDHClientKeyExchange ECDH Public value: { 4, 197, 142, 41, 18, 193, 103, 170, 159, 234, 47, 199, 143, 14, 2, 225, 13, 8, 12, 131, 12, 33, 81, 19, 69, 22, 18, 113, 207, 149, 194, 222, 33, 190, 212, 84, 250, 103, 244, 240, 125, 27, 83, 9, 244, 1, 131, 139, 105, 42, 187, 219, 226, 22, 60, 68, 84, 90, 176, 236, 96, 21, 37, 190, 217 } main, WRITE: TLSv1.2 Handshake, length = 70 SESSION KEYGEN: PreMaster Secret: 0000: 51 35 94 AE B2 02 13 88 E9 FE D3 52 56 54 A9 A9 Q5.........RVT.. 0010: F1 C1 22 03 48 AA B5 C9 DA DC E7 40 D5 D9 75 AC ..".H......@..u. CONNECTION KEYGEN: Client Nonce: 0000: 5A A6 49 DB 63 67 3D 3B 3B AC 97 23 9D 6D D9 90 Z.I.cg=;;..#.m.. 0010: 41 FF 53 FE 65 5F B7 20 62 A1 64 E1 8D 79 D5 80 A.S.e_. b.d..y.. Server Nonce: 0000: 9F 36 00 D4 BA 19 9B F3 9E DB A6 71 21 B9 8D 0F .6.........q!... 0010: CA 24 D1 3C B1 79 61 48 91 CC 73 43 39 DF 61 29 .$.<.yaH..sC9.a) Master Secret: 0000: AD 4E E5 CD D3 4E 00 C9 52 B6 E4 0C 6C 5F D3 D6 .N...N..R...l_.. 0010: CF 38 2C 67 BE 74 B7 EC FA 13 5A 54 7C 53 4A 4B .8,g.t....ZT.SJK 0020: 3D 97 41 A9 6F 26 FC 72 3F 8E 09 12 DE F4 D9 64 =.A.o&.r?......d ... no MAC keys used for this cipher Client write key: 0000: BA 1F 60 BE AE EC 81 77 FE 0F 9B F6 13 D7 1B 35 ..`....w.......5 0010: 0E FF 85 C9 72 67 04 0D F2 39 4A 38 BF AF D8 EA ....rg...9J8.... Server write key: 0000: 73 90 B6 6A 6F 9E 29 3B CA AE 98 EF 91 6F EC D4 s..jo.);.....o.. 0010: A9 AB 07 6B 65 C5 3D 8E 09 BD C4 AA 90 BC 0B 70 ...ke.=........p Client write IV: 0000: 39 F3 9F 66 9..f Server write IV: 0000: 66 10 D4 AF f... main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 218, 17, 236, 215, 18, 4, 70, 68, 133, 56, 65, 255 } *** main, WRITE: TLSv1.2 Handshake, length = 40 main, READ: TLSv1.2 Change Cipher Spec, length = 1 main, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 207, 37, 20, 148, 45, 215, 122, 201, 130, 30, 251, 233 } *** %% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] main, WRITE: TLSv1.2 Application Data, length = 209 main, READ: TLSv1.2 Handshake, length = 28 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] %% Try resuming [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] from port 45650 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1504069851 bytes = { 49, 1, 72, 254, 207, 87, 239, 175, 161, 240, 80, 88, 252, 102, 179, 83, 211, 100, 166, 155, 191, 28, 224, 219, 4, 75, 194, 197 } Session ID: {51, 148, 69, 44, 250, 130, 69, 51, 53, 229, 193, 36, 128, 192, 29, 78, 132, 155, 142, 207, 112, 171, 151, 46, 150, 223, 137, 229, 230, 87, 113, 208} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension server_name, server_name: [type=host_name (0), value=portal-test.ejpd.admin.ch] Extension renegotiation_info, renegotiated_connection: da:11:ec:d7:12:04:46:44:85:38:41:ff *** main, WRITE: TLSv1.2 Handshake, length = 314 main, READ: TLSv1.2 Handshake, length = 141 *** ServerHello, TLSv1.2 RandomCookie: GMT: 825737474 bytes = { 79, 38, 88, 249, 4, 6, 103, 135, 181, 89, 209, 133, 8, 114, 121, 223, 67, 35, 212, 59, 46, 37, 84, 12, 169, 111, 160, 185 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension server_name, server_name: Extension renegotiation_info, renegotiated_connection: da:11:ec:d7:12:04:46:44:85:38:41:ff:cf:25:14:94:2d:d7:7a:c9:82:1e:fb:e9 Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] *** %% Initialized: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] ** TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 main, READ: TLSv1.2 Handshake, length = 2044 *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=portal-test.ejpd.admin.ch, OU=Servers, O=Bundesamt fuer Informatik und Telekommunikation, L=Bern, ST=BE, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 24109167904437433945253508844342763413441845728208183254647005819933868198780296728577640607958357822408250558015383202085282842403482866361947874340498940788692215286838967482023754570995759820949362508793327877831065057670470861041451731272193094175058185897869086760581452374585244852633837402338192501727415524341078979419280212850657629638907508258572452503360478646158645100860112882483193416936550820627048860062106314761897031068761917793776773387785924043891026693008945863920194239795211639452716392625588820439122532450621258878585060338342149673355731074965264742710524889861054322551199697492763878869543 public exponent: 65537 Validity: [From: Mon Dec 04 15:45:32 CET 2017, To: Wed Dec 04 15:45:32 CET 2019] Issuer: CN=Swiss Government Public Trust Standard CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH SerialNumber: [ 63255dbd 2700e2fc f19dec0a 7578d0f0] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/PTSTCA02BC.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/bcocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 84 58 4E 87 2D A5 B0 4E 49 85 BB BC 01 71 E6 B4 .XN.-..NI....q.. 0010: C7 55 FF 10 .U.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/PTSTCA02.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Public%20Trust%20Standard%20CA%2002,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.62.14] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 36 31 5F 30 2E 70 64 66 3_61_0.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 A4 0C 81 A1 52 65 6C 69 61 6E 63 65 20 6F 0.....Reliance o 0010: 6E 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 n the SG Root CA 0020: 20 49 49 49 20 43 65 72 74 69 66 69 63 61 74 65 III Certificate 0030: 20 62 79 20 61 6E 79 20 70 61 72 74 79 20 61 73 by any party as 0040: 73 75 6D 65 73 20 61 63 63 65 70 74 61 6E 63 65 sumes acceptance 0050: 20 6F 66 20 74 68 65 20 74 68 65 6E 20 61 70 70 of the then app 0060: 6C 69 63 61 62 6C 65 20 73 74 61 6E 64 61 72 64 licable standard 0070: 20 74 65 72 6D 73 20 61 6E 64 20 63 6F 6E 64 69 terms and condi 0080: 74 69 6F 6E 73 20 6F 66 20 75 73 65 20 61 6E 64 tions of use and 0090: 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 20 the SG Root CA 00A0: 49 49 49 20 43 50 53 III CPS ]] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [8]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: portal-test.ejpd.admin.ch ] [9]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: B0 40 07 04 E3 74 03 59 AA 66 52 78 D3 8F CE 73 .@...t.Y.fRx...s 0010: 21 8E 02 79 !..y ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0A 2D 6F 0F 55 C2 C4 3A 59 40 A2 81 B4 7C 44 A9 .-o.U..:Y@....D. 0010: F6 62 76 2F A1 0D 8D 4B 28 DC 58 D6 99 AD A1 38 .bv/...K(.X....8 0020: 91 A6 33 8F 9B C6 D2 8D 98 A7 4B 58 46 33 DA 2F ..3.......KXF3./ 0030: 34 BC 32 C8 A0 DF 28 EE C3 08 B6 78 07 5D B3 27 4.2...(....x.].' 0040: 48 F7 C9 C4 96 29 5A 10 E7 BB 80 D0 D5 7C CB 13 H....)Z......... 0050: 1E 54 CC 24 1B E1 F0 A6 FF 02 80 FD D4 88 21 D9 .T.$..........!. 0060: 36 E1 4C 18 EB 65 6A 25 23 1F 83 A7 55 61 82 C9 6.L..ej%#...Ua.. 0070: 1F E8 48 50 27 91 46 21 A3 58 F0 D4 FB 25 17 59 ..HP'.F!.X...%.Y 0080: 40 95 C0 CC 83 51 F7 DF 5F 7F D2 00 D6 F7 51 FB @....Q.._.....Q. 0090: 38 C4 8A D3 64 A5 0E AB F2 A1 29 A5 99 BB A8 C0 8...d.....)..... 00A0: 2D 14 ED E5 74 34 5C 8F 7B 70 F2 19 2E 17 76 62 -...t4\..p....vb 00B0: 29 71 91 46 6E AD FE 4F 13 B7 F3 C0 D4 0A 48 7A )q.Fn..O......Hz 00C0: 3D 6E A5 0E 00 DB CD 0F 66 C4 19 99 92 3A DA 62 =n......f....:.b 00D0: 42 79 17 1C 95 C2 AC 2E C0 05 38 75 45 7A AE 50 By........8uEz.P 00E0: 8E CF D3 55 B5 95 FD 07 B4 23 C2 67 C1 15 9C C2 ...U.....#.g.... 00F0: 43 B9 21 6D 1A C8 F1 E2 2E 3E 40 AC A3 E1 4E 42 C.!m.....>@...NB 0100: 31 CB CA 85 4A 9B F5 21 95 20 29 72 04 6E AE 1A 1...J..!. )r.n.. 0110: E9 04 D2 9E 16 9A 54 A0 E5 6F AA 67 6B 1E 89 7C ......T..o.gk... 0120: D9 0F 5B 82 56 17 06 78 0E 2B 8C 66 6F A2 74 13 ..[.V..x.+.fo.t. 0130: D2 14 37 D1 D1 DA 57 8C 3B 48 67 19 3D A2 AF 76 ..7...W.;Hg.=..v 0140: BD AB 62 FB A3 1B 1E 35 18 EC 72 03 80 9A 11 13 ..b....5..r..... 0150: 3C 2A D9 5F 0D 47 60 32 BA F1 96 45 3A E3 E2 D5 <*._.G`2...E:... 0160: CD 38 AC 81 21 8F 06 B6 BB C4 37 36 DF A0 11 BA .8..!.....76.... 0170: 4D D8 61 B3 4F AF E4 04 F6 5E B1 99 53 28 3D B7 M.a.O....^..S(=. 0180: 40 A1 EA 6B 54 F0 76 58 18 C7 0B 8B BF 52 0A D0 @..kT.vX.....R.. 0190: 9F 25 B3 0D 5B 33 C8 9D 20 9F DA 02 EA CF 12 82 .%..[3.. ....... 01A0: 82 18 6A D9 2B 51 AA BC 2E 5E 22 AB 7F 76 F7 D7 ..j.+Q...^"..v.. 01B0: 52 EF 06 03 47 D7 0B 43 4E 83 88 A7 33 54 71 9C R...G..CN...3Tq. 01C0: 5E 2F 3D E3 09 BF 54 66 94 37 22 3B 28 AA 75 F4 ^/=...Tf.7";(.u. 01D0: B6 4C F3 9F ED 4E 58 83 75 74 34 13 C9 B3 A0 08 .L...NX.ut4..... 01E0: 76 0E 18 72 DA FB C5 38 2E A5 20 B8 79 AD E0 26 v..r...8.. .y..& 01F0: 51 21 08 5B 32 1F E9 90 FB 3B 51 15 54 D5 22 8A Q!.[2....;Q.T.". ] *** Found trusted certificate: [ [ Version: V3 Subject: CN=Swiss Government Public Trust Standard CA 02, OU=Certification Authorities, OU=Services, O=Swiss Government PKI, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 685030365976306227664770318750740055344262204363356489255200488126509027249780393480152864502079712591299086481583066718124997413065144941016976402995248841742873018338953833528091501640845003736986907323199933259442382032249941471222721298593830087627421951904142281784859991606199159436034251871128659464076704777826812850206320977942118734271613656876323197005486810160880335083703267372132894769474408886144461152404934157789579323380315204238874948052404550618414408891460786661785789722427748773630869667116014075529961288790262968939130590039393639686046124007735970521753063559612996046877550099638496160209002222125707394509436944658283310622941479773678664893840600319520931184326211910170022464891782188982820354161664578519645213143561901957585895416676721122741278086311046678867348741779914605643877086173379061840301443047017125731495367225812341965936171706393997817947465533551378079508519071245733796893538104510192433803881855625212534567419601711885984431423964482738786349536277691205661351201444074718234290357888994049445157777862216444875206522897011987932465352506151147605745946036172958308441499991951459951730459222349606464989902606719302708618175148080051476456284218863757216853990487613420598444880511 public exponent: 65537 Validity: [From: Wed May 11 10:36:42 CEST 2016, To: Sun May 11 10:36:42 CEST 2031] Issuer: CN=Swiss Government Root CA III, OU=www.pki.admin.ch, O=Swiss Government PKI, C=CH SerialNumber: [ 51fc8949 2b4968c0 9ec32160 76b65663] Certificate Extensions: 7 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/RootCAIII.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/ocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 07 EB 8E AA 71 CB 27 A5 BB C7 31 60 BE ED 1F CF ....q.'...1`.... 0010: A0 33 C4 E6 .3.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:0 ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/RootCAIII.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Root%20CA%20III,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.61.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 36 31 5F 30 2E 70 64 66 3_61_0.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 A4 1A 81 A1 52 65 6C 69 61 6E 63 65 20 6F 0.....Reliance o 0010: 6E 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 n the SG Root CA 0020: 20 49 49 49 20 43 65 72 74 69 66 69 63 61 74 65 III Certificate 0030: 20 62 79 20 61 6E 79 20 70 61 72 74 79 20 61 73 by any party as 0040: 73 75 6D 65 73 20 61 63 63 65 70 74 61 6E 63 65 sumes acceptance 0050: 20 6F 66 20 74 68 65 20 74 68 65 6E 20 61 70 70 of the then app 0060: 6C 69 63 61 62 6C 65 20 73 74 61 6E 64 61 72 64 licable standard 0070: 20 74 65 72 6D 73 20 61 6E 64 20 63 6F 6E 64 69 terms and condi 0080: 74 69 6F 6E 73 20 6F 66 20 75 73 65 20 61 6E 64 tions of use and 0090: 20 74 68 65 20 53 47 20 52 6F 6F 74 20 43 41 20 the SG Root CA 00A0: 49 49 49 20 43 50 53 III CPS ]] ] ] [6]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 84 58 4E 87 2D A5 B0 4E 49 85 BB BC 01 71 E6 B4 .XN.-..NI....q.. 0010: C7 55 FF 10 .U.. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 75 22 F0 9D 51 C2 83 18 E7 FF 92 50 2F 0E A6 2E u"..Q......P/... 0010: C4 21 A5 F4 26 36 DC FB 1E DB CC 65 2A 7B D8 25 .!..&6.....e*..% 0020: 52 AF 04 79 77 34 80 4B BA CB 93 81 14 BF 7B 4F R..yw4.K.......O 0030: 71 14 EE E9 A8 13 36 74 83 1F EA D7 4A 56 1F F5 q.....6t....JV.. 0040: BE 0D 4F D2 04 A6 EE BF 16 F1 89 2A 67 A4 FA B4 ..O........*g... 0050: 2B 7C 1F 66 4D 26 C0 A0 D0 84 82 C2 62 3F 05 D0 +..fM&......b?.. 0060: 55 67 DB 18 9F 1F 7D DD 91 42 96 7A 83 94 8F 1F Ug.......B.z.... 0070: E0 49 2F AD 15 5A 18 89 45 30 17 6A D2 A4 35 F5 .I/..Z..E0.j..5. 0080: C2 DE 9A 3A B3 1A 89 A0 38 46 FA CD D7 6C F5 8A ...:....8F...l.. 0090: 60 40 64 E5 93 AD 01 24 6C AF 96 1D DC BD 37 29 `@d....$l.....7) 00A0: 1B F0 66 E0 52 17 26 F5 AC 4A FB B0 1C CB 4B 7C ..f.R.&..J....K. 00B0: C8 C7 03 0D 87 72 FF 6B 72 58 32 E7 E7 25 15 C3 .....r.krX2..%.. 00C0: 57 39 8E A2 1D 8F 97 6F 46 99 67 67 C3 36 38 9A W9.....oF.gg.68. 00D0: 5C E1 ED 9F FC 3E 99 23 AF 98 AB 4F C2 C8 C7 8D \....>.#...O.... 00E0: 96 C4 CE F5 2E 65 C3 61 8F B3 0E 64 38 D9 C2 6F .....e.a...d8..o 00F0: E7 14 40 E0 3E 3E CA 46 9F F5 E6 55 04 A6 5C FF ..@.>>.F...U..\. 0100: 02 B8 DA 39 09 00 75 36 50 86 E6 A9 D2 A3 E1 A1 ...9..u6P....... 0110: 2A 33 50 3C 13 D4 C7 0E E5 6F D2 A1 C4 A8 41 8E *3P<.....o....A. 0120: A8 67 E3 64 3E 8A 39 99 5D D7 D3 26 70 C5 8D 2F .g.d>.9.]..&p../ 0130: 9F AE 16 4D 80 AA 30 EF 57 7F 1D CF 9F 84 D8 1A ...M..0.W....... 0140: F3 A2 24 16 69 3B 8F DE A0 8D 48 26 A0 61 C4 B7 ..$.i;....H&.a.. 0150: E7 93 74 D3 80 12 0A 3F 9D 79 C0 74 EB 3C 27 6F ..t....?.y.t.<'o 0160: E5 3B 47 53 14 84 D4 A2 BE 85 02 97 59 53 B5 EA .;GS........YS.. 0170: 06 00 62 1B 90 C8 AC A8 99 A4 E0 C7 CF EA A8 F6 ..b............. 0180: EB 3E 85 AC B7 89 EF BA A5 64 1A F3 1A 0E 12 EA .>.......d...... 0190: F9 9A 48 5C AC 51 DB 23 98 FA AC 6B 60 08 D0 A5 ..H\.Q.#...k`... 01A0: EE 20 A1 30 CB 57 B9 A8 C9 7E BC 4D 0D 74 14 11 . .0.W.....M.t.. 01B0: 8B 9D 1B B0 05 C8 FF 7B 81 86 F2 1E 3D 8F F6 EA ............=... 01C0: 2A EF 0E BF 8B 68 5C 7A 0E 75 7B 26 0F 69 D1 29 *....h\z.u.&.i.) 01D0: C2 97 7F E2 88 0C C9 02 AD D9 26 11 EE BB 66 90 ..........&...f. 01E0: C2 49 19 4A F2 30 52 9C 6B 72 A7 7F BF CE 90 8D .I.J.0R.kr...... 01F0: B4 C3 F4 2D 3A 07 35 DB 35 57 1E 8C 96 2A 27 FF ...-:.5.5W...*'. ] main, READ: TLSv1.2 Handshake, length = 357 *** ECDH ServerKeyExchange Signature Algorithm SHA512withRSA Server key: Sun EC public key, 256 bits public x coord: 6116631012750096277819468783308193166726044821254813173088559085325998828968 public y coord: 68596775533960773461584898246176003650054635793478623442770390789659189748486 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) main, READ: TLSv1.2 Handshake, length = 1149 *** CertificateRequest Cert Types: RSA, DSS, ECDSA Supported Signature Algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, SHA224withRSA, SHA224withDSA, SHA224withECDSA, SHA1withRSA, SHA1withDSA, SHA1withECDSA Cert Authorities: *** ServerHelloDone matching alias: tuser-sysp-scu0000a *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=TUSER-SYSP-SCU0000A, OU=Systemplattform eDokumente, O=Admin, C=CH Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25027028182467694683913544237864432927282293074107818818807877030342847025279370734421683740554850424603261221390884946917720650812037177195092324408255542817305102504561912559357382998882681995977594048854862774935856446333282718263266097364335331528566453171905299121492184294388240012767009265273349666578909993284706766338539099718470792098345416589669101833977550740610552957432532910777688674819680872156485206333249722165631496690963418223753492714815880450556778994104167461657295422152540978158216242899021588749185064992353328162973038301095198406145123154145338064733148394967347800016877457018421517446681 public exponent: 65537 Validity: [From: Fri Jan 20 10:59:40 CET 2017, To: Mon Jan 20 10:59:40 CET 2020] Issuer: CN=Swiss Government Regular CA 01, OU=Certification Authorities, OU=Services, O=Admin, C=CH SerialNumber: [ 4ea774a2 4ec4163f 3d3681d4 83eca550] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://www.pki.admin.ch/aia/RegularCA01.crt , accessMethod: ocsp accessLocation: URIName: http://www.pki.admin.ch/aia/ocsp ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 4D 77 B5 E4 EF 6D 9C C3 9B A0 3A 87 E1 A6 EE 08 Mw...m....:..... 0010: A7 39 E7 8B .9.. ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://www.pki.admin.ch/crl/RegularCA01.crl] , DistributionPoint: [URIName: ldap://admindir.admin.ch:389/cn=Swiss%20Government%20Regular%20CA%2001,ou=Certification%20Authorities,ou=Services,o=Admin,c=CH] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.756.1.17.3.22.23] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 38 68 74 74 70 3A 2F 2F 77 77 77 2E 70 6B 69 .8http://www.pki 0010: 2E 61 64 6D 69 6E 2E 63 68 2F 63 70 73 2F 43 50 .admin.ch/cps/CP 0020: 53 5F 32 5F 31 36 5F 37 35 36 5F 31 5F 31 37 5F S_2_16_756_1_17_ 0030: 33 5F 32 31 5F 31 2E 70 64 66 3_21_1.pdf ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 B0 1A 81 AD 54 68 65 20 70 75 72 70 6F 73 0.....The purpos 0010: 65 20 6F 66 20 74 68 69 73 20 63 65 72 74 69 66 e of this certif 0020: 69 63 61 74 65 20 69 73 20 73 6F 6C 65 6C 79 20 icate is solely 0030: 69 6E 74 65 6E 64 65 64 20 66 6F 72 20 73 79 73 intended for sys 0040: 74 65 6D 20 70 6C 61 74 66 6F 72 6D 20 65 44 6F tem platform eDo 0050: 6B 75 6D 65 6E 74 65 20 61 70 70 6C 69 63 61 74 kumente applicat 0060: 69 6F 6E 20 75 73 61 67 65 73 2E 20 54 68 65 20 ion usages. The 0070: 73 75 62 6A 65 63 74 20 69 73 20 61 20 74 65 63 subject is a tec 0080: 68 6E 69 63 61 6C 20 75 73 65 72 20 72 65 66 65 hnical user refe 0090: 72 65 6E 63 65 64 20 69 6E 20 74 68 65 20 64 61 renced in the da 00A0: 74 61 62 61 73 65 20 6F 66 20 49 53 43 2D 45 4A tabase of ISC-EJ 00B0: 50 44 2E PD. ]] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ emailProtection clientAuth 1.3.6.1.4.1.311.20.2.2 1.3.6.1.4.1.311.10.3.4 ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [8]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ RFC822Name: juerg.blaser@isc-ejpd.admin.ch ] [9]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: E1 88 99 91 11 01 56 40 8D F1 E6 AE 0D F5 96 6E ......V@.......n 0010: A7 87 4F 18 ..O. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 5E 6D 26 5C 80 B1 22 63 63 09 F2 1A 73 72 24 E9 ^m&\.."cc...sr$. 0010: 1A 0D 78 A9 6E 93 D0 32 32 75 70 00 51 58 60 0D ..x.n..22up.QX`. 0020: 62 3D AE F8 89 30 C6 4C 37 C1 E9 56 A9 B6 9C 97 b=...0.L7..V.... 0030: F4 46 2E 82 7E C2 F4 8E E4 08 0E B9 E3 89 62 40 .F............b@ 0040: EC D1 B3 B3 FB 14 0C 48 AD B3 02 B2 4D A4 D5 3A .......H....M..: 0050: 21 63 0B C9 E1 E1 E8 87 A0 49 22 2E 4D D1 89 CA !c.......I".M... 0060: 97 CA DD A2 94 DC D0 F8 EA 3C 11 84 E1 58 C2 4A .........<...X.J 0070: A0 6E 16 2E 0D 0E 32 CC 91 72 39 B1 79 E0 B4 3B .n....2..r9.y..; 0080: 6B 68 B5 18 D0 CE B1 CA 1A 45 43 D2 C0 90 BA 94 kh.......EC..... 0090: 85 24 36 0C D9 1A 60 05 E2 78 ED 53 BF 8B 42 FD .$6...`..x.S..B. 00A0: 0B 9F 88 3C 5F 5B 04 17 68 D9 70 04 DE 29 3A 8D ...<_[..h.p..):. 00B0: 4B E6 D5 4F 5C 16 C2 ED EC C3 EF 3E E4 D2 94 7B K..O\......>.... 00C0: 18 50 78 60 DF 67 6C 7C 18 76 8C 8C 9B E7 A7 5C .Px`.gl..v.....\ 00D0: AC 4D 31 A8 17 C6 48 CE 46 9A D0 23 F7 B6 3F 74 .M1...H.F..#..?t 00E0: 76 CC FE 86 32 E2 0C B6 DF 91 72 19 B6 C3 1E 90 v...2.....r..... 00F0: 44 33 74 62 83 86 82 9F 51 72 84 31 43 7D 5D 9F D3tb....Qr.1C.]. 0100: C4 9F 22 71 79 FE D9 B9 31 C7 EB F8 74 BB 98 64 .."qy...1...t..d 0110: 80 34 03 A4 D1 06 1F 3D 94 3B 62 BC 94 01 E0 57 .4.....=.;b....W 0120: 4C 69 EB 3E 2A 43 18 AF A5 82 8B 6C 07 59 21 41 Li.>*C.....l.Y!A 0130: F1 7D 1C 16 51 31 DC 39 EA 4C 0A 08 BA A3 BD A8 ....Q1.9.L...... 0140: 16 61 E4 10 D2 5C 58 D8 C1 1E 71 E6 22 F8 8F 84 .a...\X...q."... 0150: BB 2E E4 86 E8 5A C4 CA 43 66 7D F4 9E DF CB 74 .....Z..Cf.....t 0160: AD 6A 36 00 D8 58 D4 4F 00 20 AD 50 33 69 68 80 .j6..X.O. .P3ih. 0170: E3 9D 74 8A 67 0D EA 2C FA 86 52 85 B1 EC 72 39 ..t.g..,..R...r9 0180: C8 7B A9 03 FC BF DF 00 FD 57 E5 61 E3 75 49 83 .........W.a.uI. 0190: B7 29 A0 5D 15 72 C5 EA 0D EE EF 43 D5 A6 68 E9 .).].r.....C..h. 01A0: EC 37 22 DF A6 F4 75 5F 64 E7 F4 87 04 0C 79 FB .7"...u_d.....y. 01B0: FB F5 D7 89 36 DB 77 C8 F7 04 CE 2C 16 3D 89 E0 ....6.w....,.=.. 01C0: 71 57 7C 04 47 84 36 26 5C F6 60 20 BB 9B 95 9C qW..G.6&\.` .... 01D0: F0 AE AE 9F 65 BE F7 A8 00 52 2A 16 9E 78 D5 67 ....e....R*..x.g 01E0: 75 4B BB CF 1A DD 30 CC 78 2B BE E0 0B C5 12 8B uK....0.x+...... 01F0: F1 8C 12 AE A7 C0 FF 26 0E 49 33 2C 42 79 32 37 .......&.I3,By27 ] *** *** ECDHClientKeyExchange ECDH Public value: { 4, 29, 50, 57, 110, 144, 111, 252, 200, 10, 144, 199, 137, 165, 218, 242, 4, 232, 139, 218, 15, 102, 101, 110, 141, 176, 165, 182, 227, 26, 125, 77, 109, 102, 26, 233, 144, 17, 22, 167, 187, 23, 52, 88, 188, 59, 121, 26, 190, 170, 204, 164, 206, 44, 228, 62, 44, 247, 167, 73, 249, 20, 6, 147, 219 } main, WRITE: TLSv1.2 Handshake, length = 2051 SESSION KEYGEN: PreMaster Secret: 0000: 81 CB 51 0E 0C 48 4F ED 83 55 88 F1 6E 2E 7D 6C ..Q..HO..U..n..l 0010: BD F8 1E DB 3B 45 CE B0 35 B7 4C B3 CA 9D 5E 9C ....;E..5.L...^. CONNECTION KEYGEN: Client Nonce: 0000: 5A A6 49 DB 31 01 48 FE CF 57 EF AF A1 F0 50 58 Z.I.1.H..W....PX 0010: FC 66 B3 53 D3 64 A6 9B BF 1C E0 DB 04 4B C2 C5 .f.S.d.......K.. Server Nonce: 0000: 31 38 C1 02 4F 26 58 F9 04 06 67 87 B5 59 D1 85 18..O&X...g..Y.. 0010: 08 72 79 DF 43 23 D4 3B 2E 25 54 0C A9 6F A0 B9 .ry.C#.;.%T..o.. Master Secret: 0000: 53 AE E3 B2 78 4B E9 AB 92 97 5A BD AF 84 1E C0 S...xK....Z..... 0010: 51 53 56 D1 10 B0 4F 72 C6 D0 45 4C 0B 79 6A D2 QSV...Or..EL.yj. 0020: 8E F3 CA CF 58 78 DF 01 6C 11 60 98 AD 61 BA 59 ....Xx..l.`..a.Y ... no MAC keys used for this cipher Client write key: 0000: BA 9D 2F 39 9D 46 B9 4B 9F B5 79 63 BE 2C 4D AC ../9.F.K..yc.,M. 0010: 2A 0E 80 55 C8 9E ED 6C B5 D5 69 BE FA 3F B5 59 *..U...l..i..?.Y Server write key: 0000: EC 41 50 75 07 9C D4 60 C3 44 07 16 65 53 9E 50 .APu...`.D..eS.P 0010: 2C C8 2A D3 5F FE F7 3B 27 43 1E 65 AD 3D C4 ED ,.*._..;'C.e.=.. Client write IV: 0000: BB 8B 1E 7A ...z Server write IV: 0000: 08 C4 50 B7 ..P. *** CertificateVerify Signature Algorithm SHA512withRSA main, WRITE: TLSv1.2 Handshake, length = 288 main, WRITE: TLSv1.2 Change Cipher Spec, length = 25 *** Finished verify_data: { 226, 87, 253, 39, 214, 131, 117, 135, 50, 170, 165, 174 } *** main, WRITE: TLSv1.2 Handshake, length = 40 main, READ: TLSv1.2 Change Cipher Spec, length = 25 main, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 45, 116, 155, 87, 71, 81, 254, 82, 118, 101, 229, 177 } *** %% Cached client session: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] main, READ: TLSv1.2 Application Data, length = 676 >>> Response Code: 200 main, READ: TLSv1.2 Application Data, length = 6683 Keep-Alive-Timer, called close() Keep-Alive-Timer, called closeInternal(true) Keep-Alive-Timer, SEND TLSv1.2 ALERT: warning, description = close_notify Keep-Alive-Timer, WRITE: TLSv1.2 Alert, length = 26 Keep-Alive-Timer, called closeSocket(true) >>> Run 1 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called main, the previous server name in SNI (type=host_name (0), value=portal-test.ejpd.admin.ch) was replaced with (type=host_name (0), value=portal-test.ejpd.admin.ch) Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% Client cached [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] %% Try resuming [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] from port 45651 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1504069862 bytes = { 7, 171, 85, 216, 76, 75, 147, 232, 58, 246, 94, 60, 152, 234, 178, 17, 106, 244, 182, 229, 44, 153, 59, 167, 19, 61, 203, 47 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension server_name, server_name: [type=host_name (0), value=portal-test.ejpd.admin.ch] *** main, WRITE: TLSv1.2 Handshake, length = 275 main, READ: TLSv1.2 Handshake, length = 81 *** ServerHello, TLSv1.2 RandomCookie: GMT: -1991704027 bytes = { 46, 75, 212, 165, 200, 41, 91, 192, 102, 18, 82, 11, 220, 210, 13, 85, 245, 173, 105, 240, 92, 187, 52, 36, 53, 34, 133, 29 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** CONNECTION KEYGEN: Client Nonce: 0000: 5A A6 49 E6 07 AB 55 D8 4C 4B 93 E8 3A F6 5E 3C Z.I...U.LK..:.^< 0010: 98 EA B2 11 6A F4 B6 E5 2C 99 3B A7 13 3D CB 2F ....j...,.;..=./ Server Nonce: 0000: 89 49 02 25 2E 4B D4 A5 C8 29 5B C0 66 12 52 0B .I.%.K...)[.f.R. 0010: DC D2 0D 55 F5 AD 69 F0 5C BB 34 24 35 22 85 1D ...U..i.\.4$5".. Master Secret: 0000: 53 AE E3 B2 78 4B E9 AB 92 97 5A BD AF 84 1E C0 S...xK....Z..... 0010: 51 53 56 D1 10 B0 4F 72 C6 D0 45 4C 0B 79 6A D2 QSV...Or..EL.yj. 0020: 8E F3 CA CF 58 78 DF 01 6C 11 60 98 AD 61 BA 59 ....Xx..l.`..a.Y ... no MAC keys used for this cipher Client write key: 0000: CB B4 0D A6 20 AA 76 DB 5D E5 29 40 E7 C7 33 CB .... .v.].)@..3. 0010: CC 21 E0 CB 11 22 51 5E 12 08 BD 8B 1E E5 C7 BC .!..."Q^........ Server write key: 0000: 15 DC 7D 0D E6 BC F9 A5 C8 43 32 9A A0 A9 A9 2D .........C2....- 0010: 81 99 97 ED 78 8F C9 0B 16 2A 57 30 A3 A3 4B DC ....x....*W0..K. Client write IV: 0000: B6 0A 15 98 .... Server write IV: 0000: 22 E9 B4 81 "... %% Server resumed [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] main, READ: TLSv1.2 Change Cipher Spec, length = 1 main, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 101, 95, 122, 104, 49, 63, 217, 228, 14, 254, 85, 115 } *** main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 152, 144, 76, 193, 15, 194, 103, 120, 89, 32, 238, 156 } *** main, WRITE: TLSv1.2 Handshake, length = 40 main, WRITE: TLSv1.2 Application Data, length = 209 main, READ: TLSv1.2 Application Data, length = 676 >>> Response Code: 200 main, READ: TLSv1.2 Application Data, length = 6683 >>> Run 2 main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 26 main, called closeSocket(true) Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called main, the previous server name in SNI (type=host_name (0), value=portal-test.ejpd.admin.ch) was replaced with (type=host_name (0), value=portal-test.ejpd.admin.ch) Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% Client cached [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] %% Try resuming [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] from port 45653 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1504069872 bytes = { 187, 133, 151, 213, 234, 134, 243, 99, 6, 83, 142, 12, 127, 207, 214, 7, 88, 134, 104, 146, 74, 208, 89, 149, 66, 190, 21, 92 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension server_name, server_name: [type=host_name (0), value=portal-test.ejpd.admin.ch] *** main, WRITE: TLSv1.2 Handshake, length = 275 main, READ: TLSv1.2 Handshake, length = 81 *** ServerHello, TLSv1.2 RandomCookie: GMT: 265657988 bytes = { 168, 13, 29, 118, 17, 105, 118, 193, 252, 161, 98, 197, 32, 9, 13, 53, 48, 150, 69, 94, 172, 26, 76, 101, 204, 200, 75, 12 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** CONNECTION KEYGEN: Client Nonce: 0000: 5A A6 49 F0 BB 85 97 D5 EA 86 F3 63 06 53 8E 0C Z.I........c.S.. 0010: 7F CF D6 07 58 86 68 92 4A D0 59 95 42 BE 15 5C ....X.h.J.Y.B..\ Server Nonce: 0000: 10 D6 9F 84 A8 0D 1D 76 11 69 76 C1 FC A1 62 C5 .......v.iv...b. 0010: 20 09 0D 35 30 96 45 5E AC 1A 4C 65 CC C8 4B 0C ..50.E^..Le..K. Master Secret: 0000: 53 AE E3 B2 78 4B E9 AB 92 97 5A BD AF 84 1E C0 S...xK....Z..... 0010: 51 53 56 D1 10 B0 4F 72 C6 D0 45 4C 0B 79 6A D2 QSV...Or..EL.yj. 0020: 8E F3 CA CF 58 78 DF 01 6C 11 60 98 AD 61 BA 59 ....Xx..l.`..a.Y ... no MAC keys used for this cipher Client write key: 0000: ED 84 16 0E 26 70 3B EE D0 DD C8 80 EF 30 D2 C3 ....&p;......0.. 0010: 76 45 62 6E 86 25 CE 61 61 24 16 42 E0 13 A8 BD vEbn.%.aa$.B.... Server write key: 0000: B7 E2 81 0D 61 00 B6 4D AF F2 08 5E C6 5C DC D8 ....a..M...^.\.. 0010: 5B 8A 56 D5 FB 59 37 25 94 33 95 16 5A BF 71 05 [.V..Y7%.3..Z.q. Client write IV: 0000: 18 0B F4 D0 .... Server write IV: 0000: F5 BC AB 3E ...> %% Server resumed [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] main, READ: TLSv1.2 Change Cipher Spec, length = 1 main, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 80, 74, 235, 37, 189, 242, 150, 156, 59, 19, 210, 225 } *** main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 176, 55, 16, 78, 215, 83, 240, 56, 32, 44, 249, 120 } *** main, WRITE: TLSv1.2 Handshake, length = 40 main, WRITE: TLSv1.2 Application Data, length = 209 main, READ: TLSv1.2 Application Data, length = 676 >>> Response Code: 200 main, READ: TLSv1.2 Application Data, length = 5544 main, READ: TLSv1.2 Application Data, length = 1163 Keep-Alive-Timer, called close() Keep-Alive-Timer, called closeInternal(true) Keep-Alive-Timer, SEND TLSv1.2 ALERT: warning, description = close_notify Keep-Alive-Timer, WRITE: TLSv1.2 Alert, length = 26 Keep-Alive-Timer, called closeSocket(true) >>> Run 3 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called main, the previous server name in SNI (type=host_name (0), value=portal-test.ejpd.admin.ch) was replaced with (type=host_name (0), value=portal-test.ejpd.admin.ch) Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% Client cached [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] %% Try resuming [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] from port 45654 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1504069882 bytes = { 33, 101, 138, 172, 192, 59, 53, 78, 78, 78, 41, 241, 91, 131, 233, 201, 220, 135, 213, 106, 80, 252, 107, 77, 68, 90, 177, 229 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension server_name, server_name: [type=host_name (0), value=portal-test.ejpd.admin.ch] *** main, WRITE: TLSv1.2 Handshake, length = 275 main, READ: TLSv1.2 Handshake, length = 81 *** ServerHello, TLSv1.2 RandomCookie: GMT: -1263101089 bytes = { 181, 234, 158, 211, 20, 92, 130, 91, 155, 64, 103, 247, 169, 176, 155, 132, 73, 19, 248, 14, 166, 1, 130, 44, 198, 123, 174, 189 } Session ID: {31, 195, 80, 68, 154, 175, 1, 151, 187, 2, 124, 3, 174, 51, 128, 163, 178, 20, 210, 56, 142, 154, 200, 249, 161, 92, 82, 9, 185, 237, 163, 247} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** CONNECTION KEYGEN: Client Nonce: 0000: 5A A6 49 FA 21 65 8A AC C0 3B 35 4E 4E 4E 29 F1 Z.I.!e...;5NNN). 0010: 5B 83 E9 C9 DC 87 D5 6A 50 FC 6B 4D 44 5A B1 E5 [......jP.kMDZ.. Server Nonce: 0000: B5 B7 9B 5F B5 EA 9E D3 14 5C 82 5B 9B 40 67 F7 ..._.....\.[.@g. 0010: A9 B0 9B 84 49 13 F8 0E A6 01 82 2C C6 7B AE BD ....I......,.... Master Secret: 0000: 53 AE E3 B2 78 4B E9 AB 92 97 5A BD AF 84 1E C0 S...xK....Z..... 0010: 51 53 56 D1 10 B0 4F 72 C6 D0 45 4C 0B 79 6A D2 QSV...Or..EL.yj. 0020: 8E F3 CA CF 58 78 DF 01 6C 11 60 98 AD 61 BA 59 ....Xx..l.`..a.Y ... no MAC keys used for this cipher Client write key: 0000: BA 9F D5 0C EB 98 A1 FE 9A 9F BB 97 35 4F D1 07 ............5O.. 0010: 01 09 13 54 97 4B 6C C6 F1 BC 59 9E 56 DD CB B2 ...T.Kl...Y.V... Server write key: 0000: 27 BD 24 19 38 B7 CE C8 60 83 6E 05 D3 AF 6D 49 '.$.8...`.n...mI 0010: 0B A2 33 2A DE 24 0C D1 1F 49 CC 47 40 8C 7C 14 ..3*.$...I.G@... Client write IV: 0000: BA 65 EF BE .e.. Server write IV: 0000: 8E CA E3 12 .... %% Server resumed [Session-2, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384] main, READ: TLSv1.2 Change Cipher Spec, length = 1 main, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 190, 140, 105, 21, 226, 84, 253, 52, 238, 34, 78, 75 } *** main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 250, 190, 101, 159, 89, 224, 56, 150, 70, 184, 79, 198 } *** main, WRITE: TLSv1.2 Handshake, length = 40 main, WRITE: TLSv1.2 Application Data, length = 209 main, READ: TLSv1.2 Application Data, length = 676 >>> Response Code: 200 main, READ: TLSv1.2 Application Data, length = 6683 Disconnected from the target VM, address: '127.0.0.1:48776', transport: 'socket' Process finished with exit code 130 (interrupted by signal 2: SIGINT)