System property jdk.tls.client.cipherSuites is set to 'null' System property jdk.tls.server.cipherSuites is set to 'null' Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_3DES_EDE_CBC_MD5 Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DH_anon_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5 Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Ignoring disabled cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA Inaccessible trust store: D:\jdk-11\lib\security\jssecacerts Inaccessible trust store: D:\jdk-11\lib\security\jssecacerts trustStore is: trustStore type is: pkcs12 trustStore provider is: the last modified time is: Thu Jan 01 05:30:00 IST 1970 Reload the trust store No available key store Reload trust certs Reloaded 0 trust certs trigger seeding of SecureRandom done seeding SecureRandom Inaccessible trust store: D:\jdk-11\lib\security\jssecacerts Inaccessible trust store: D:\jdk-11\lib\security\jssecacerts trustStore is: trustStore type is: pkcs12 trustStore provider is: the last modified time is: Thu Jan 01 05:30:00 IST 1970 keyStore is : keyStore type is : pkcs12 keyStore provider is : init keystore init keymanager of type SunX509 trigger seeding of SecureRandom done seeding SecureRandom Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {97 5B F4 60 A3 CA E6 3C 30 F0 4D BA 43 D4 FF B0 67 1F E2 1A 54 44 F5 31 D0 ED 06 F3 38 48 8E CC} Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension supported_groups, group names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension extended_master_secret Extension server_name, server_name: [type=host_name (0), value=www.google.com] Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: *** main, WRITE: TLSv1.2 Handshake, length = 255 [Raw write]: length = 260 0000: 16 03 03 00 FF 01 00 00 FB 03 03 97 5B F4 60 A3 ............[.`. 0010: CA E6 3C 30 F0 4D BA 43 D4 FF B0 67 1F E2 1A 54 ..<0.M.C...g...T 0020: 44 F5 31 D0 ED 06 F3 38 48 8E CC 00 00 56 C0 2C D.1....8H....V., 0030: C0 2B C0 30 00 9D C0 2E C0 32 00 9F 00 A3 C0 2F .+.0.....2...../ 0040: 00 9C C0 2D C0 31 00 9E 00 A2 C0 24 C0 28 00 3D ...-.1.....$.(.= 0050: C0 26 C0 2A 00 6B 00 6A C0 0A C0 14 00 35 C0 05 .&.*.k.j.....5.. 0060: C0 0F 00 39 00 38 C0 23 C0 27 00 3C C0 25 C0 29 ...9.8.#.'.<.%.) 0070: 00 67 00 40 C0 09 C0 13 00 2F C0 04 C0 0E 00 33 .g.@...../.....3 0080: 00 32 00 FF 01 00 00 7C 00 0A 00 20 00 1E 00 17 .2......... .... 0090: 00 18 00 19 00 09 00 0A 00 0B 00 0C 00 0D 00 0E ................ 00A0: 00 16 01 00 01 01 01 02 01 03 01 04 00 0B 00 02 ................ 00B0: 01 00 00 0D 00 16 00 14 06 03 06 01 05 03 05 01 ................ 00C0: 04 03 04 01 04 02 02 03 02 01 02 02 00 17 00 00 ................ 00D0: 00 00 00 13 00 11 00 00 0E 77 77 77 2E 67 6F 6F .........www.goo 00E0: 67 6C 65 2E 63 6F 6D 00 11 00 10 00 0E 02 00 04 gle.com......... 00F0: 00 00 00 00 01 00 04 00 00 00 00 00 05 00 05 01 ................ 0100: 00 00 00 00 .... [Raw read]: length = 5 0000: 16 03 03 00 5B ....[ [Raw read]: length = 91 0000: 02 00 00 57 03 03 5B 45 A0 DF 59 62 69 7B 51 8F ...W..[E..Ybi.Q. 0010: F7 42 5F BD F5 8B 88 0C A8 F7 6C 8C 61 C1 95 B9 .B_.......l.a... 0020: 9F 87 22 FE 9B 64 20 35 90 00 E9 B5 25 8D AA 7F .."..d 5....%... 0030: 58 2B D0 3F 79 39 B2 56 CF E0 3F 59 79 6D 5B 53 X+.?y9.V..?Yym[S 0040: B5 49 29 02 8D 8B 52 C0 2B 00 00 0F FF 01 00 01 .I)...R.+....... 0050: 00 00 17 00 00 00 0B 00 02 01 00 ........... main, READ: TLSv1.2 Handshake, length = 91 check handshake state: server_hello[2] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {5B 45 A0 DF 59 62 69 7B 51 8F F7 42 5F BD F5 8B 88 0C A8 F7 6C 8C 61 C1 95 B9 9F 87 22 FE 9B 64} Session ID: {53, 144, 0, 233, 181, 37, 141, 170, 127, 88, 43, 208, 63, 121, 57, 178, 86, 207, 224, 63, 89, 121, 109, 91, 83, 181, 73, 41, 2, 141, 139, 82} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: Extension extended_master_secret Extension ec_point_formats, formats: [uncompressed] *** %% Initialized: [Session-2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256] ** TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] [Raw read]: length = 5 0000: 16 03 03 08 38 ....8 [Raw read]: length = 1024 0000: 0B 00 08 34 00 08 31 00 03 CB 30 82 03 C7 30 82 ...4..1...0...0. 0010: 02 AF A0 03 02 01 02 02 08 22 2B CC CF CA 14 5C ........."+....\ 0020: 3E 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 >0...*.H........ 0030: 30 54 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0T1.0...U....US1 0040: 1E 30 1C 06 03 55 04 0A 13 15 47 6F 6F 67 6C 65 .0...U....Google 0050: 20 54 72 75 73 74 20 53 65 72 76 69 63 65 73 31 Trust Services1 0060: 25 30 23 06 03 55 04 03 13 1C 47 6F 6F 67 6C 65 %0#..U....Google 0070: 20 49 6E 74 65 72 6E 65 74 20 41 75 74 68 6F 72 Internet Author 0080: 69 74 79 20 47 33 30 1E 17 0D 31 38 30 36 31 39 ity G30...180619 0090: 31 31 33 38 34 39 5A 17 0D 31 38 30 38 32 38 31 113849Z..1808281 00A0: 31 33 31 30 30 5A 30 68 31 0B 30 09 06 03 55 04 13100Z0h1.0...U. 00B0: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 0C 0A ...US1.0...U.... 00C0: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 00D0: 55 04 07 0C 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 00E0: 65 77 31 13 30 11 06 03 55 04 0A 0C 0A 47 6F 6F ew1.0...U....Goo 00F0: 67 6C 65 20 4C 4C 43 31 17 30 15 06 03 55 04 03 gle LLC1.0...U.. 0100: 0C 0E 77 77 77 2E 67 6F 6F 67 6C 65 2E 63 6F 6D ..www.google.com 0110: 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 0Y0...*.H.=....* 0120: 86 48 CE 3D 03 01 07 03 42 00 04 7F 18 15 EB 7E .H.=....B....... 0130: 9D C8 35 76 53 42 05 AB 30 20 C8 08 BF FB 94 68 ..5vSB..0 .....h 0140: 2B F1 5E E3 F1 E4 9B 4C 29 0F 8C 7B D1 25 D6 13 +.^....L)....%.. 0150: 9F 0C AF B4 24 B7 86 0A 40 FF 82 55 88 9B B5 F6 ....$...@..U.... 0160: 41 AE D8 B9 3F 62 81 65 B2 C2 93 A3 82 01 52 30 A...?b.e......R0 0170: 82 01 4E 30 13 06 03 55 1D 25 04 0C 30 0A 06 08 ..N0...U.%..0... 0180: 2B 06 01 05 05 07 03 01 30 0E 06 03 55 1D 0F 01 +.......0...U... 0190: 01 FF 04 04 03 02 07 80 30 19 06 03 55 1D 11 04 ........0...U... 01A0: 12 30 10 82 0E 77 77 77 2E 67 6F 6F 67 6C 65 2E .0...www.google. 01B0: 63 6F 6D 30 68 06 08 2B 06 01 05 05 07 01 01 04 com0h..+........ 01C0: 5C 30 5A 30 2D 06 08 2B 06 01 05 05 07 30 02 86 \0Z0-..+.....0.. 01D0: 21 68 74 74 70 3A 2F 2F 70 6B 69 2E 67 6F 6F 67 !http://pki.goog 01E0: 2F 67 73 72 32 2F 47 54 53 47 49 41 47 33 2E 63 /gsr2/GTSGIAG3.c 01F0: 72 74 30 29 06 08 2B 06 01 05 05 07 30 01 86 1D rt0)..+.....0... 0200: 68 74 74 70 3A 2F 2F 6F 63 73 70 2E 70 6B 69 2E http://ocsp.pki. 0210: 67 6F 6F 67 2F 47 54 53 47 49 41 47 33 30 1D 06 goog/GTSGIAG30.. 0220: 03 55 1D 0E 04 16 04 14 F3 F3 10 A6 AC E0 83 D6 .U.............. 0230: 54 8E 79 5A E5 13 36 83 78 EC 52 85 30 0C 06 03 T.yZ..6.x.R.0... 0240: 55 1D 13 01 01 FF 04 02 30 00 30 1F 06 03 55 1D U.......0.0...U. 0250: 23 04 18 30 16 80 14 77 C2 B8 50 9A 67 76 76 B1 #..0...w..P.gvv. 0260: 2D C2 86 D0 83 A0 7E A6 7E BA 4B 30 21 06 03 55 -.........K0!..U 0270: 1D 20 04 1A 30 18 30 0C 06 0A 2B 06 01 04 01 D6 . ..0.0...+..... 0280: 79 02 05 03 30 08 06 06 67 81 0C 01 02 02 30 31 y...0...g.....01 0290: 06 03 55 1D 1F 04 2A 30 28 30 26 A0 24 A0 22 86 ..U...*0(0&.$.". 02A0: 20 68 74 74 70 3A 2F 2F 63 72 6C 2E 70 6B 69 2E http://crl.pki. 02B0: 67 6F 6F 67 2F 47 54 53 47 49 41 47 33 2E 63 72 goog/GTSGIAG3.cr 02C0: 6C 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 l0...*.H........ 02D0: 03 82 01 01 00 97 4D D6 9E 12 B6 5B 79 49 46 72 ......M....[yIFr 02E0: 57 0A 22 28 4D 2C 79 97 36 B2 C7 3D AA 55 6F 73 W."(M,y.6..=.Uos 02F0: 5F E9 89 69 C3 C5 4A 21 47 E0 15 75 41 87 1B DC _..i..J!G..uA... 0300: 9C A6 AD B1 CF 0B 29 FA DE A3 E0 AD B2 F2 79 FB ......).......y. 0310: 7A 74 64 A8 DE 27 8F F2 F5 FE 30 02 8C 17 6C 99 ztd..'....0...l. 0320: 56 FB 75 0F 1A 62 BE 56 02 1A 0C 65 1B 27 36 5A V.u..b.V...e.'6Z 0330: FC DC 78 53 1A 34 F4 F1 EB 2D 89 01 82 79 80 34 ..xS.4...-...y.4 0340: 2A 32 33 E8 08 84 45 8C FF 81 CD A2 86 A4 45 87 *23...E.......E. 0350: 83 2A 58 8C 77 C5 3A 03 FC EB 09 37 FF 7E D7 55 .*X.w.:....7...U 0360: 6A A7 1E F0 81 CF C8 EA C9 A3 CA B3 58 48 CE 69 j...........XH.i 0370: E6 76 CF 23 01 EF E5 04 04 59 D8 D8 24 FA 20 42 .v.#.....Y..$. B 0380: A3 D8 9B 16 5A D7 53 DB 08 F5 4B 87 D9 3E 0D 0C ....Z.S...K..>.. 0390: 90 A4 3A D8 CC B1 30 2D 50 91 66 DC DD C0 B5 B5 ..:...0-P.f..... 03A0: 16 F6 DF 8E 4A 02 CF C3 B0 9F 55 8E 68 2B 42 93 ....J.....U.h+B. 03B0: 7A 66 52 C7 9F CE 00 9E 38 A6 C1 27 AC 9A 0B 77 zfR.....8..'...w 03C0: 15 B9 A6 19 1A 01 CB A3 BF 94 43 14 40 8B 12 38 ..........C.@..8 03D0: 44 56 F1 5B BC 00 04 60 30 82 04 5C 30 82 03 44 DV.[...`0..\0..D 03E0: A0 03 02 01 02 02 0D 01 E3 A9 30 1C FC 72 06 38 ..........0..r.8 03F0: 3F 9A 53 1D 30 0D 06 09 2A 86 48 86 F7 0D 01 01 ?.S.0...*.H..... [Raw read]: length = 1024 0000: 0B 05 00 30 4C 31 20 30 1E 06 03 55 04 0B 13 17 ...0L1 0...U.... 0010: 47 6C 6F 62 61 6C 53 69 67 6E 20 52 6F 6F 74 20 GlobalSign Root 0020: 43 41 20 2D 20 52 32 31 13 30 11 06 03 55 04 0A CA - R21.0...U.. 0030: 13 0A 47 6C 6F 62 61 6C 53 69 67 6E 31 13 30 11 ..GlobalSign1.0. 0040: 06 03 55 04 03 13 0A 47 6C 6F 62 61 6C 53 69 67 ..U....GlobalSig 0050: 6E 30 1E 17 0D 31 37 30 36 31 35 30 30 30 30 34 n0...17061500004 0060: 32 5A 17 0D 32 31 31 32 31 35 30 30 30 30 34 32 2Z..211215000042 0070: 5A 30 54 31 0B 30 09 06 03 55 04 06 13 02 55 53 Z0T1.0...U....US 0080: 31 1E 30 1C 06 03 55 04 0A 13 15 47 6F 6F 67 6C 1.0...U....Googl 0090: 65 20 54 72 75 73 74 20 53 65 72 76 69 63 65 73 e Trust Services 00A0: 31 25 30 23 06 03 55 04 03 13 1C 47 6F 6F 67 6C 1%0#..U....Googl 00B0: 65 20 49 6E 74 65 72 6E 65 74 20 41 75 74 68 6F e Internet Autho 00C0: 72 69 74 79 20 47 33 30 82 01 22 30 0D 06 09 2A rity G30.."0...* 00D0: 86 48 86 F7 0D 01 01 01 05 00 03 82 01 0F 00 30 .H.............0 00E0: 82 01 0A 02 82 01 01 00 CA 52 4B EA 1E FF CE 24 .........RK....$ 00F0: 6B A8 DA 72 18 68 D5 56 5D 0E 48 5A 2D 35 09 76 k..r.h.V].HZ-5.v 0100: 5A CF A4 C8 1C B1 A9 FE 53 89 FB AD 34 FF 88 5B Z.......S...4..[ 0110: 9F BB E7 E8 00 01 DC 35 73 75 03 AD B3 B1 B9 A4 .......5su...... 0120: 7D 2B 26 79 CE 15 40 0A EF 51 B8 9F 32 8C 7C 70 .+&y..@..Q..2..p 0130: 86 52 4B 16 FE 6A 27 6B E6 36 7A 62 50 D8 DF 9A .RK..j'k.6zbP... 0140: 89 CC 09 29 EB 4F 29 14 88 80 0B 8F 38 1E 80 6A ...).O).....8..j 0150: 18 7C 1D BD 97 3B 78 7D 45 49 36 4F 41 CD A2 E0 .....;x.EI6OA... 0160: 76 57 3C 68 31 79 64 C9 6E D7 51 1E 66 C3 A2 64 vW.c..K.DfW. 0010: 14 B4 96 F0 DC 2C 57 3F 52 04 AD 95 AA 7D 4D D0 .....,W?R.....M. 0020: F2 0C 9F 9C 40 E8 D6 55 73 BA 3C DF 90 CB 00 5B ....@..Us.<....[ 0030: 21 11 67 C2 ED 32 1E DE !.g..2.. main, READ: TLSv1.2 Handshake, length = 2104 check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=www.google.com, O=Google LLC, L=Mountain View, ST=California, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun EC public key, 256 bits public x coord: 57486287385224518456871688099024216208249057546110480213910519166558515302284 public y coord: 56004012548390228849921375250734136449999619089009845961286545179598583415443 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Validity: [From: Tue Jun 19 17:08:49 IST 2018, To: Tue Aug 28 17:01:00 IST 2018] Issuer: CN=Google Internet Authority G3, O=Google Trust Services, C=US SerialNumber: [ 222bcccf ca145c3e] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://pki.goog/gsr2/GTSGIAG3.crt , accessMethod: ocsp accessLocation: URIName: http://ocsp.pki.goog/GTSGIAG3 ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 77 C2 B8 50 9A 67 76 76 B1 2D C2 86 D0 83 A0 7E w..P.gvv.-...... 0010: A6 7E BA 4B ...K ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.pki.goog/GTSGIAG3.crl] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.11129.2.5.3] [] ] [CertificatePolicyId: [2.23.140.1.2.2] [] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature ] [8]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: www.google.com ] [9]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: F3 F3 10 A6 AC E0 83 D6 54 8E 79 5A E5 13 36 83 ........T.yZ..6. 0010: 78 EC 52 85 x.R. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 97 4D D6 9E 12 B6 5B 79 49 46 72 57 0A 22 28 4D .M....[yIFrW."(M 0010: 2C 79 97 36 B2 C7 3D AA 55 6F 73 5F E9 89 69 C3 ,y.6..=.Uos_..i. 0020: C5 4A 21 47 E0 15 75 41 87 1B DC 9C A6 AD B1 CF .J!G..uA........ 0030: 0B 29 FA DE A3 E0 AD B2 F2 79 FB 7A 74 64 A8 DE .).......y.ztd.. 0040: 27 8F F2 F5 FE 30 02 8C 17 6C 99 56 FB 75 0F 1A '....0...l.V.u.. 0050: 62 BE 56 02 1A 0C 65 1B 27 36 5A FC DC 78 53 1A b.V...e.'6Z..xS. 0060: 34 F4 F1 EB 2D 89 01 82 79 80 34 2A 32 33 E8 08 4...-...y.4*23.. 0070: 84 45 8C FF 81 CD A2 86 A4 45 87 83 2A 58 8C 77 .E.......E..*X.w 0080: C5 3A 03 FC EB 09 37 FF 7E D7 55 6A A7 1E F0 81 .:....7...Uj.... 0090: CF C8 EA C9 A3 CA B3 58 48 CE 69 E6 76 CF 23 01 .......XH.i.v.#. 00A0: EF E5 04 04 59 D8 D8 24 FA 20 42 A3 D8 9B 16 5A ....Y..$. B....Z 00B0: D7 53 DB 08 F5 4B 87 D9 3E 0D 0C 90 A4 3A D8 CC .S...K..>....:.. 00C0: B1 30 2D 50 91 66 DC DD C0 B5 B5 16 F6 DF 8E 4A .0-P.f.........J 00D0: 02 CF C3 B0 9F 55 8E 68 2B 42 93 7A 66 52 C7 9F .....U.h+B.zfR.. 00E0: CE 00 9E 38 A6 C1 27 AC 9A 0B 77 15 B9 A6 19 1A ...8..'...w..... 00F0: 01 CB A3 BF 94 43 14 40 8B 12 38 44 56 F1 5B BC .....C.@..8DV.[. ] chain [1] = [ [ Version: V3 Subject: CN=Google Internet Authority G3, O=Google Trust Services, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits params: null modulus: 25540719540096549801967532215622388028057340978592080609141732382164154646816296526083121741669679112385237833865384918487699354232562775118368146858293595735927525741548199921580705526790385577846106238921439103492392479618335857028746954930496648766472236039621875919970487709839673576509420299423776077274146396625683921324935984297937024355312712214769839608906726548857225274820644855735385444361318783494335259738982362137265282486277074790515499222682891121616563234042637263891559249011361734853144492241992433528066411156317991355405830410464673595997849166914573354017491657353926030969623191808378512203827 public exponent: 65537 Validity: [From: Thu Jun 15 05:30:42 IST 2017, To: Wed Dec 15 05:30:42 IST 2021] Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 SerialNumber: [ 01e3a930 1cfc7206 383f9a53 1d] Certificate Extensions: 8 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.pki.goog/gsr2 ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 9B E2 07 57 67 1C 1E C0 6A 06 DE 59 B4 9A 2D DF ...Wg...j..Y..-. 0010: DC 19 86 2E .... ] ] [3]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:0 ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.pki.goog/gsr2/gsr2.crl] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 70 6B 69 2E 67 6F ..https://pki.go 0010: 6F 67 2F 72 65 70 6F 73 69 74 6F 72 79 2F og/repository/ ]] ] ] [6]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [8]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 77 C2 B8 50 9A 67 76 76 B1 2D C2 86 D0 83 A0 7E w..P.gvv.-...... 0010: A6 7E BA 4B ...K ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 1C B7 89 96 E4 53 ED BB EC DB A8 32 01 9F 2C A3 .....S.....2..,. 0010: CD 6D AD 42 12 77 B3 B8 E6 C9 03 52 60 20 7B 57 .m.B.w.....R` .W 0020: 27 C6 11 B5 3F 67 0D 99 2C 5B 5A CA 22 0A DD 9E '...?g..,[Z."... 0030: BB 1F 4B 48 3F 8F 02 3D 8B 21 84 45 1D 6D F5 FF ..KH?..=.!.E.m.. 0040: AC 68 89 CD 64 E2 D6 D6 5E 40 C2 8E 2A F7 EF 14 .h..d...^@..*... 0050: D3 36 A4 40 30 F5 32 15 15 92 76 FB 7E 9E 53 EA .6.@0.2...v...S. 0060: C2 76 FC 39 AD 88 FE 66 92 26 E9 1C C4 38 CD 49 .v.9...f.&...8.I 0070: FA 43 87 F0 5D D6 56 4D 81 D7 7F F1 C2 DD B0 4D .C..].VM.......M 0080: FE C3 2A 6E 7C 9F 6E 5C ED 62 42 99 E1 F7 36 EE ..*n..n\.bB...6. 0090: 14 8C 2C 20 E3 46 97 5A 77 03 C0 A0 C6 4A 88 FD .., .F.Zw....J.. 00A0: 40 22 87 72 5A 18 EA 9C A5 C7 5A 08 8C E4 05 A4 @".rZ.....Z..... 00B0: 7D B9 84 35 5F 89 36 56 0E 40 3D 12 E8 BB 35 72 ...5_.6V.@=...5r 00C0: ED AF 08 56 4E B0 BB 2E A9 9B E4 FB 1D 3E 0B 63 ...VN........>.c 00D0: C8 9B 4B 91 44 66 57 C0 14 B4 96 F0 DC 2C 57 3F ..K.DfW......,W? 00E0: 52 04 AD 95 AA 7D 4D D0 F2 0C 9F 9C 40 E8 D6 55 R.....M.....@..U 00F0: 73 BA 3C DF 90 CB 00 5B 21 11 67 C2 ED 32 1E DE s.<....[!.g..2.. ] *** main, handling exception: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty %% Invalidated: [Session-2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256] main, SEND TLSv1.2 ALERT: fatal, description = internal_error main, WRITE: TLSv1.2 Alert, length = 2 [Raw write]: length = 7 0000: 15 03 03 00 02 02 50 ......P main, called closeSocket() javax.net.ssl.SSLException: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty at java.base/sun.security.ssl.Alerts.getSSLException(Alerts.java:214) at java.base/sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1974) at java.base/sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1926) at java.base/sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1909) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1436) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:567) at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1581) at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1509) at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:245) at JI9027508.main(JI9027508.java:29) Caused by: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty at java.base/sun.security.validator.PKIXValidator.(PKIXValidator.java:89) at java.base/sun.security.validator.Validator.getInstance(Validator.java:181) at java.base/sun.security.ssl.X509TrustManagerImpl.getValidator(X509TrustManagerImpl.java:330) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrustedInit(X509TrustManagerImpl.java:180) at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:192) at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:133) at java.base/sun.security.ssl.ClientHandshaker.checkServerCerts(ClientHandshaker.java:1947) at java.base/sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1777) at java.base/sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:264) at java.base/sun.security.ssl.Handshaker.processLoop(Handshaker.java:1098) at java.base/sun.security.ssl.Handshaker.processRecord(Handshaker.java:1026) at java.base/sun.security.ssl.SSLSocketImpl.processInputRecord(SSLSocketImpl.java:1137) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1074) at java.base/sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at java.base/sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1402) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1429) ... 7 more Caused by: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty at java.base/java.security.cert.PKIXParameters.setTrustAnchors(PKIXParameters.java:200) at java.base/java.security.cert.PKIXParameters.(PKIXParameters.java:120) at java.base/java.security.cert.PKIXBuilderParameters.(PKIXBuilderParameters.java:104) at java.base/sun.security.validator.PKIXValidator.(PKIXValidator.java:86) ... 22 more