-------------------------------------------------- TEST: closed/security/infra/java/security/cert/CertPathValidator/certification/ComodoCA.java TEST JDK: c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261 ACTION: build -- Passed. All files up to date REASON: User specified action: run build ValidatePathWithParams TIME: 0.002 seconds messages: command: build ValidatePathWithParams reason: User specified action: run build ValidatePathWithParams elapsed time (seconds): 0.002 ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.001 seconds messages: command: build ComodoCA reason: Named class compiled on demand elapsed time (seconds): 0.001 ACTION: main -- Passed. Execution successful REASON: User specified action: run main/othervm -Djava.security.debug=certpath ComodoCA OCSP TIME: 2.111 seconds messages: command: main -Djava.security.debug=certpath ComodoCA OCSP reason: User specified action: run main/othervm -Djava.security.debug=certpath ComodoCA OCSP Mode: othervm [/othervm specified] elapsed time (seconds): 2.111 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:16 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:57 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:42 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:50:04 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test STDERR: certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints.permits(): SHA1withRSA Variant: generic certpath: KeySizeConstraints.permits(): RSA certpath: Constraints.permits(): SHA1 Variant: generic certpath: PKIXCertPathValidator.engineValidate()... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 104, -112, -28, 103, -92, -90, 83, -128, -57, -122, 102, -92, -15, -9, 75, 67, -5, -124, -67, 109] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -96, 17, 10, 35, 62, -106, -15, 7, -20, -30, -81, 41, -17, -126, -91, 127, -48, 48, -92, -76] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -102, -81, 41, 122, -64, 17, 53, 53, 38, 81, 48, 0, -61, 106, -2, 64, -43, -82, -42, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -65, 95, -73, -47, -50, -35, 31, -122, -12, 91, 85, -84, -36, -41, 16, -62, 14, -87, -120, -25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -60, 121, -54, -114, -95, 78, 3, 29, 28, -36, 107, -37, 49, 91, -108, 62, 63, 48, 127, 45] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 106, 114, 38, 122, -48, 30, -17, 125, -25, 59, 105, 81, -44, 108, -115, -97, -112, 18, 102, -85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -55, -128, 119, -32, 98, -110, -126, -11, 70, -100, -13, -70, -9, 76, -61, -34, -72, -93, -83, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -38, -69, 46, -86, -80, 12, -72, -120, 38, 81, 116, 92, 109, 3, -45, -64, -40, -113, 122, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 85, -28, -127, -47, 17, -128, -66, -40, -119, -71, 8, -93, 49, -7, -95, 36, 9, 22, -71, 112] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 9b7e0649a33e62b9d5ee90487129ef57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 36122296c5e338a520a1d25f4cd70954 Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -16, 40, 117, -127, -41, 65, -128, -31, -52, -58, -69, -104, 17, 44, 98, -14, 26, 84, -14, 97] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -82, 108, 5, -93, -109, 19, -30, -94, -25, -30, -41, 28, -42, -57, -16, 127, -56, 103, 83, -96] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -45, -108, -118, 76, 98, 19, 42, 25, 46, -52, -81, 114, -118, 125, 54, -41, -102, 28, -36, 103] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 8, 74, -96, -86, 88, -124, -45, 94, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -45, -20, -57, 58, 101, 110, -52, -31, -38, 118, -102, 86, -5, -100, -13, -122, 109, 87, -27, -127] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -99, -64, 103, -90, 12, 34, -39, 38, -11, 69, -85, -90, 101, 82, 17, 39, -40, 69, -84, 99] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -117, 75, 109, -19, -45, 41, -71, 6, 25, -20, 57, 57, -87, -16, -105, -124, 106, -53, -17, -33] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 91, 37, 123, -106, -92, 101, 81, 126, -72, 57, -13, -64, 120, 102, 94, -24, 58, -25, -16, -18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -65, 89, 32, 54, 0, 121, -96, -96, 34, 107, -116, -43, -14, 97, -46, -72, 44, -53, -126, 74] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -96, 115, 73, -103, 104, -36, -123, 91, 101, -29, -101, 40, 47, 87, -97, -67, 51, -68, 7, 72] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -19, -25, 111, 118, 90, -65, 96, -20, 73, 91, -58, -91, 119, -69, 114, 22, 113, -101, -60, 61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -27, -99, 89, 48, -126, 71, 88, -52, -84, -6, 8, 84, 54, -122, 123, 58, -75, 4, 77, -16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 7dd9fe07cfa81eb7107967fba78934c6 Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -85, -74, -37, -41, 6, -98, 55, -84, 48, -122, 7, -111, 112, -57, -100, -60, 25, -79, 120, -64] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -53, -48, -67, -87, -31, -104, 5, 81, -95, 77, 55, -94, -125, 121, -50, -115, 29, 42, -28, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL certpath: X509CertSelector.match(SN: 10020 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: X509CertSelector.match(SN: 4caaf9cadb636fe01ff74ed85b03869d Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: AlgorithmChecker.contains: SHA384withRSA certpath: AnchorCertificate.contains: matched CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: trustedMatch = true certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withRSA Variant: generic certpath: KeySizeConstraints.permits(): RSA certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.5.29.32.0 certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:00 IST 2021... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB; subject: CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB; serial#: 61791086908916947884024501610337875119 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 2e7c87cc 0e934a52 fe94fd1c b7cd34af Subject: CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: connecting to OCSP service at: http://ocsp.comodoca.com certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: BBAF7E023DFAA6F13C848EADEE3898ECD93232D4 certpath: OCSP response produced at: Wed Jun 23 08:22:18 IST 2021 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Wed Jun 23 08:22:18 IST 2021 certpath: nextUpdate: Wed Jun 30 08:22:18 IST 2021 certpath: Status of certificate (with serial number 61791086908916947884024501610337875119) is: GOOD certpath: OCSP response is signed by the target's Issuing CA certpath: Constraints.permits(): SHA384withRSA Variant: generic certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Wed Jun 23 08:22:18 IST 2021 until Wed Jun 30 08:22:18 IST 2021 certpath: Checking validity of OCSP response on: Thu Jun 24 18:47:00 IST 2021 certpath: -checker7 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: CN=COMODO CA Limited, O=COMODO CA Limited, STREET=7 Campus Road, L=Bradford, ST=West Yorkshire, OID.2.5.4.17=BD7 1HR, C=US certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA256withRSA Variant: generic certpath: KeySizeConstraints.permits(): RSA certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.6449.1.2.1.3.2 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) 1.3.6.1.4.1.6449.1.2.1.3.2 CRIT: false EP: 1.3.6.1.4.1.6449.1.2.1.3.2 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:00 IST 2021... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -1, 24, 40, 118, -7, 72, 5, 44, -95, -82, -15, 43, 27, 43, -78, 83, -8, 75, 124, -77] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -74, 119, -6, 105, 72, 71, -97, 83, 18, -43, -62, -22, 7, 50, 118, 7, -47, -105, 7, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 69, -21, -94, -81, -12, -110, -53, -126, 49, 45, 81, -117, -89, -89, 33, -99, -13, 109, -56, 15] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 21, 95, 53, 87, 81, 85, -5, 37, -78, -83, 3, 105, -4, 1, -93, -6, -66, 17, 85, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 123, 91, 69, -49, -81, -50, -53, 122, -3, 49, -110, 26, 106, -74, -13, 70, -21, 87, 72, 80] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -60, -89, -79, -92, 123, 44, 113, -6, -37, -31, 75, -112, 117, -1, -60, 21, 96, -123, -119, 16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -20, -41, -29, -126, -46, 113, 93, 100, 76, -33, 46, 103, 63, -25, -70, -104, -82, 28, 15, 79] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -99, -109, -58, 83, -117, 94, -54, -81, 63, -97, 30, 15, -27, -103, -107, -68, 36, -10, -108, -113] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -77, -37, 72, -92, -7, -95, -59, -40, -82, 54, 65, -52, 17, 99, 105, 98, 41, -68, 75, -58] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 84, -80, 123, -83, 69, -72, -30, 64, 127, -5, 10, 110, -5, -66, 51, -55, 60, -93, -124, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 80, -81, -52, 7, -121, 21, 71, 111, 56, -59, -76, 101, -47, -34, -107, -86, -23, -33, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -7, 36, -84, 15, -78, -75, -8, 121, -64, -6, 96, -120, 27, -60, -39, 77, 2, -98, 23, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 117, 113, -89, 25, 72, 25, -68, -99, -99, -22, 65, 71, -33, -108, -60, 72, 119, -103, -45, 121] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 44, -43, 80, 65, -105, 21, -117, -16, -113, 54, 97, 91, 74, -5, 107, -39, -103, -55, 51, -110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 58, -102, -123, 7, 16, 103, 40, -74, -17, -10, -67, 5, 65, 110, 32, -63, -108, -38, 15, -34] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 26, -124, 98, -68, 72, 76, 51, 37, 4, -44, -18, -48, -10, 3, -60, 25, 70, -47, -108, 107] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -93, -105, -42, -13, 94, -94, 16, -31, -85, 69, -97, 60, 23, 100, 60, -18, 1, 112, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 121, -76, 89, -26, 123, -74, -27, -28, 1, 115, -128, 8, -120, -56, 26, 88, -10, -23, -101, 110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 77, 38, 32, 34, -119, 75, -45, -43, -92, 10, -95, 111, -34, -30, 18, -127, -59, -15, 60, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -124, 24, -52, -123, 52, -20, -68, 12, -108, -108, 46, 8, 89, -100, -57, -78, 16, 78, 10, 8] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -83, -67, -104, 122, 52, -76, 38, -9, -6, -60, 38, 84, -17, 3, -67, -32, 36, -53, 84, 26] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 96, 123, 102, 26, 69, 13, -105, -54, -119, 80, 47, 125, 4, -51, 52, -88, -1, -4, -3, 75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 83, 121, -65, 90, -86, 43, 74, -49, 84, -128, -31, -40, -101, -64, -99, -14, -78, 3, 102, -53] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 10, -123, -87, 119, 101, 5, -104, 124, 64, -127, -8, 15, -105, 44, 56, -15, 10, -20, 60, -49] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -80, 12, -16, 76, 48, -12, 5, 88, 2, 72, -3, 51, -27, 82, -81, 75, -124, -29, 102, 82] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US certpath: X509CertSelector.match(SN: 1a5 Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 8, 118, -51, -53, 7, -1, 36, -10, -59, -51, -19, -69, -112, -68, -30, -124, 55, 70, 117, -9] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -100, 95, 0, -33, -86, 1, -41, 48, 43, 56, -120, -94, -72, 109, 74, -100, -14, 17, -111, -125] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -29, 113, -32, -98, -40, -89, 66, -39, -37, 113, -111, 107, -108, -109, -21, -61, -93, -47, 20, -93] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -16, -113, 89, 56, 0, -77, -11, -113, -102, -106, 12, -43, -21, -6, 123, -86, 23, -24, 19, 18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 78, 34, 84, 32, 24, -107, -26, -29, 110, -26, 15, -6, -6, -71, 18, -19, 6, 23, -113, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -29, -108, -11, -79, 77, -23, -37, -95, 41, 91, 87, -117, 77, 118, 6, 118, -31, -47, -94, -118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -83, 108, -86, -108, 96, -100, -19, -28, -1, -6, 62, 10, 116, 43, 99, 3, -9, -74, 89, -65] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -79, 62, -61, 105, 3, -8, -65, 71, 1, -44, -104, 38, 26, 8, 2, -17, 99, 100, 43, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -77, 22, -111, -3, -18, -90, 110, -28, -75, 46, 73, -113, -121, 120, -127, -128, -20, -27, -79, -75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 23, -96, -51, -63, -28, 65, -74, 58, 91, 59, -53, 69, -99, -67, 28, -62, -104, -6, -122, 88] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 3, -34, 80, 53, 86, -47, 76, -69, 102, -16, -93, -30, 27, 27, -61, -105, -78, 61, -47, 85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -101, -30, 7, 87, 103, 28, 30, -64, 106, 6, -34, 89, -76, -102, 45, -33, -36, 25, -122, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -50, -61, 74, -71, -103, 8 ... Output overflow: JT Harness has limited the test output to the text at the beginning and the end, so that you can see how the test began, and how it completed. If you need to see more of the output from the test, set the system property javatest.maxOutputSize to a higher value. The current value is 100000 ... aptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -71, 9, -54, -100, 30, -37, -45, 108, 58, 107, -82, -19, 84, -15, 91, -109, 6, 53, 46, 94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 3, -34, 80, 53, 86, -47, 76, -69, 102, -16, -93, -30, 27, 27, -61, -105, -78, 61, -47, 85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -73, 99, -25, 26, -35, -115, -23, 8, -90, 85, -125, -92, -32, 106, 80, 65, 101, 17, 66, 73] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 30, 12, -9, -74, 103, -14, -31, -110, 38, 9, 69, -64, 85, 57, 46, 119, 63, 66, 74, -94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -75, 3, -9, 118, 59, 97, -126, 106, 18, -86, 24, 83, -21, 3, 33, -108, -65, -2, -50, -54] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -124, 24, -52, -123, 52, -20, -68, 12, -108, -108, 46, 8, 89, -100, -57, -78, 16, 78, 10, 8] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 23, 21, -123, -119, 9, 47, 36, -121, 111, 63, 29, 27, -28, -14, -106, 121, -125, 72, 19, -50] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 57, -107, -117, 98, -117, 92, -55, -44, -128, -70, 88, 15, -105, 63, 21, 8, 67, -52, -104, -89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -7, 36, -84, 15, -78, -75, -8, 121, -64, -6, 96, -120, 27, -60, -39, 77, 2, -98, 23, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -58, 79, -94, 61, 6, 99, -124, 9, -100, -50, 98, -28, 4, -84, -115, 92, -75, -23, -74, 27] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -60, 121, -54, -114, -95, 78, 3, 29, 28, -36, 107, -37, 49, 91, -108, 62, 63, 48, 127, 45] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -99, -64, 103, -90, 12, 34, -39, 38, -11, 69, -85, -90, 101, 82, 17, 39, -40, 69, -84, 99] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -101, -30, 7, 87, 103, 28, 30, -64, 106, 6, -34, 89, -76, -102, 45, -33, -36, 25, -122, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 66, 50, -74, 22, -6, 4, -3, -2, 93, 75, 122, -61, -3, -9, 76, 64, 29, 90, 67, -81] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 117, 113, -89, 25, 72, 25, -68, -99, -99, -22, 65, 71, -33, -108, -60, 72, 119, -103, -45, 121] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 67c8e1e8e3be1cbdfc913b8ea6238749 Issuer: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -16, 40, 117, -127, -41, 65, -128, -31, -52, -58, -69, -104, 17, 44, 98, -14, 26, 84, -14, 97] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -29, 113, -32, -98, -40, -89, 66, -39, -37, 113, -111, 107, -108, -109, -21, -61, -93, -47, 20, -93] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -64, 122, -104, 104, -115, -119, -5, -85, 5, 100, 12, 17, 125, -86, 125, 101, -72, -54, -52, 78] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 10, -123, -87, 119, 101, 5, -104, 124, 64, -127, -8, 15, -105, 44, 56, -15, 10, -20, 60, -49] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 104, -112, -28, 103, -92, -90, 83, -128, -57, -122, 102, -92, -15, -9, 75, 67, -5, -124, -67, 109] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 58, -102, -123, 7, 16, 103, 40, -74, -17, -10, -67, 5, 65, 110, 32, -63, -108, -38, 15, -34] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -93, -105, -42, -13, 94, -94, 16, -31, -85, 69, -97, 60, 23, 100, 60, -18, 1, 112, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -102, -81, 41, 122, -64, 17, 53, 53, 38, 81, 48, 0, -61, 106, -2, 64, -43, -82, -42, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 26, -124, 98, -68, 72, 76, 51, 37, 4, -44, -18, -48, -10, 3, -60, 25, 70, -47, -108, 107] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -27, -99, 89, 48, -126, 71, 88, -52, -84, -6, 8, 84, 54, -122, 123, 58, -75, 4, 77, -16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -58, 23, -48, -68, -88, -22, 2, 67, -14, 27, 6, -103, 93, 43, -112, 32, -71, -41, -100, -28] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 7dd9fe07cfa81eb7107967fba78934c6 Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: X509CertSelector.match(SN: 5c8b99c55a94c5d27156decd8980cc26 Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: AlgorithmChecker.contains: SHA384withECDSA certpath: AnchorCertificate.contains: matched CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: trustedMatch = true certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA Variant: generic certpath: KeySizeConstraints.permits(): EC certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.5.29.32.0 certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:01 IST 2021... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US; subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US; serial#: 146910433462551487119872777360491570703 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 6e85eb98 71602754 42d67a92 64f6660f Subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: connecting to OCSP service at: http://ocsp.trust-provider.com certpath: OCSP response status: SUCCESSFUL certpath: OCSP response type: basic certpath: Responder ID: byKey: 3AE10986D4CF19C29676744976DCE035C663639A certpath: OCSP response produced at: Wed Jun 23 08:22:18 IST 2021 certpath: OCSP number of SingleResponses: 1 certpath: thisUpdate: Wed Jun 23 08:22:18 IST 2021 certpath: nextUpdate: Wed Jun 30 08:22:18 IST 2021 certpath: Status of certificate (with serial number 146910433462551487119872777360491570703) is: GOOD certpath: OCSP response is signed by the target's Issuing CA certpath: Constraints.permits(): SHA384withECDSA Variant: generic certpath: Verified signature of OCSP Response certpath: OCSP response validity interval is from Wed Jun 23 08:22:18 IST 2021 until Wed Jun 30 08:22:18 IST 2021 certpath: Checking validity of OCSP response on: Thu Jun 24 18:47:01 IST 2021 certpath: -checker7 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: CN=COMODO CA Limited, O=COMODO CA Limited, STREET=7 Campus Road, L=Bradford, ST=West Yorkshire, OID.2.5.4.17=BD7 1HR, C=US certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA256withECDSA Variant: generic certpath: KeySizeConstraints.permits(): EC certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.6449.1.2.1.3.2 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) 1.3.6.1.4.1.6449.1.2.1.3.2 CRIT: false EP: 1.3.6.1.4.1.6449.1.2.1.3.2 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:01 IST 2021... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 82, -40, -120, 58, -56, -97, 120, 102, -19, -119, -13, 123, 56, 112, -108, -55, 2, 2, 54, -48] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -96, 17, 10, 35, 62, -106, -15, 7, -20, -30, -81, 41, -17, -126, -91, 127, -48, 48, -92, -76] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -1, 24, 40, 118, -7, 72, 5, 44, -95, -82, -15, 43, 27, 43, -78, 83, -8, 75, 124, -77] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 106, 114, 38, 122, -48, 30, -17, 125, -25, 59, 105, 81, -44, 108, -115, -97, -112, 18, 102, -85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 127, -45, 101, -89, -62, -35, -20, -69, -16, 48, 9, -13, 67, 57, -6, 2, -81, 51, 49, 51] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -16, -113, 89, 56, 0, -77, -11, -113, -102, -106, 12, -43, -21, -6, 123, -86, 23, -24, 19, 18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 91, 37, 123, -106, -92, 101, 81, 126, -72, 57, -13, -64, 120, 102, 94, -24, 58, -25, -16, -18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 84, -80, 123, -83, 69, -72, -30, 64, 127, -5, 10, 110, -5, -66, 51, -55, 60, -93, -124, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 77, 38, 32, 34, -119, 75, -45, -43, -92, 10, -95, 111, -34, -30, 18, -127, -59, -15, 60, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 8, 118, -51, -53, 7, -1, 36, -10, -59, -51, -19, -69, -112, -68, -30, -124, 55, 70, 117, -9] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -55, -128, 119, -32, 98, -110, -126, -11, 70, -100, -13, -70, -9, 76, -61, -34, -72, -93, -83, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: b92f60cc889fa17a4609b85b706c8aaf Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 36122296c5e338a520a1d25f4cd70954 Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US certpath: X509CertSelector.match(SN: 1a5 Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 23, -96, -51, -63, -28, 65, -74, 58, 91, 59, -53, 69, -99, -67, 28, -62, -104, -6, -122, 88] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL certpath: X509CertSelector.match(SN: 10020 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 61, -26, 41, 72, -101, -22, 7, -54, 33, 68, 74, 38, -34, 110, -34, -46, -125, -48, -97, 89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -45, -108, -118, 76, 98, 19, 42, 25, 46, -52, -81, 114, -118, 125, 54, -41, -102, 28, -36, 103] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -100, 95, 0, -33, -86, 1, -41, 48, 43, 56, -120, -94, -72, 109, 74, -100, -14, 17, -111, -125] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 7, 31, -46, -25, -100, -38, -62, 110, -94, 64, -76, -80, 122, 80, 16, 80, 116, -60, -56, -67] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -117, 75, 109, -19, -45, 41, -71, 6, 25, -20, 57, 57, -87, -16, -105, -124, 106, -53, -17, -33] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -113, -16, 75, 127, -88, 46, 69, 36, -82, 77, 80, -6, 99, -102, -117, -34, -30, -35, 27, -68] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -53, -48, -67, -87, -31, -104, 5, 81, -95, 77, 55, -94, -125, 121, -50, -115, 29, 42, -28, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 121, -76, 89, -26, 123, -74, -27, -28, 1, 115, -128, 8, -120, -56, 26, 88, -10, -23, -101, 110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -38, -19, 100, 116, 20, -100, 20, 60, -85, -35, -103, -87, -67, 91, 40, 77, -117, 60, -55, -40] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 123, 91, 69, -49, -81, -50, -53, 122, -3, 49, -110, 26, 106, -74, -13, 70, -21, 87, 72, 80] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -20, -41, -29, -126, -46, 113, 93, 100, 76, -33, 46, 103, 63, -25, -70, -104, -82, 28, 15, 79] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -99, -109, -58, 83, -117, 94, -54, -81, 63, -97, 30, 15, -27, -103, -107, -68, 36, -10, -108, -113] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -83, -67, -104, 122, 52, -76, 38, -9, -6, -60, 38, 84, -17, 3, -67, -32, 36, -53, 84, 26] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -45, -20, -57, 58, 101, 110, -52, -31, -38, 118, -102, 86, -5, -100, -13, -122, 109, 87, -27, -127] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -46, -60, -80, -46, -111, -44, 76, 17, 113, -77, 97, -53, 61, -95, -2, -35, -88, 106, -44, -29] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -79, 62, -61, 105, 3, -8, -65, 71, 1, -44, -104, 38, 26, 8, 2, -17, 99, 100, 43, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -74, 119, -6, 105, 72, 71, -97, 83, 18, -43, -62, -22, 7, 50, 118, 7, -47, -105, 7, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 83, 121, -65, 90, -86, 43, 74, -49, 84, -128, -31, -40, -101, -64, -99, -14, -78, 3, 102, -53] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 9b7e0649a33e62b9d5ee90487129ef57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -50, -61, 74, -71, -103, 85, -14, -72, -37, 96, -65, -87, 126, -67, 86, -75, -105, 54, -89, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -65, 89, 32, 54, 0, 121, -96, -96, 34, 107, -116, -43, -14, 97, -46, -72, 44, -53, -126, 74] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -85, -74, -37, -41, 6, -98, 55, -84, 48, -122, 7, -111, 112, -57, -100, -60, 25, -79, 120, -64] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 3c9131cb1ff6d01b0e9ab8d044bf12be Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -29, -108, -11, -79, 77, -23, -37, -95, 41, 91, 87, -117, 77, 118, 6, 118, -31, -47, -94, -118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 8, 74, -96, -86, 88, -124, -45, 94, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 69, -21, -94, -81, -12, -110, -53, -126, 49, 45, 81, -117, -89, -89, 33, -99, -13, 109, -56, 15] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -83, 108, -86, -108, 96, -100, -19, -28, -1, -6, 62, 10, 116, 43, 99, 3, -9, -74, 89, -65] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -77, -37, 72, -92, -7, -95, -59, -40, -82, 54, 65, -52, 17, 99, 105, 98, 41, -68, 75, -58] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 71, -72, -51, -1, -27, 111, -18, -8, -78, -20, 47, 78, 14, -7, 37, -80, -114, 60, 107, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -102, -40, 0, 48, 0, -25, 107, 127, -123, 24, -18, -117, -74, -50, -118, 12, -8, 17, -31, -69] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 96, 123, 102, 26, 69, 13, -105, -54, -119, 80, 47, 125, 4, -51, 52, -88, -1, -4, -3, 75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -3, -38, 20, -60, -97, 48, -34, 33, -67, 30, 66, 57, -4, -85, 99, 35, 73, -32, -15, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -38, -69, 46, -86, -80, 12, -72, -120, 38, 81, 116, 92, 109, 3, -45, -64, -40, -113, 122, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -19, -25, 111, 118, 90, -65, 96, -20, 73, 91, -58, -91, 119, -69, 114, 22, 113, -101, -60, 61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 124, 12, 50, 31, -89, -39, 48, 127, -60, 125, 104, -93, 98, -88, -95, -50, -85, 7, 91, 39] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 85, -28, -127, -47, 17, -128, -66, -40, -119, -71, 8, -93, 49, -7, -95, 36, 9, 22, -71, 112] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -65, 95, -73, -47, -50, -35, 31, -122, -12, 91, 85, -84, -36, -41, 16, -62, 14, -87, -120, -25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -80, 12, -16, 76, 48, -12, 5, 88, 2, 72, -3, 51, -27, 82, -81, 75, -124, -29, 102, 82] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -14, -64, 19, -32, -126, 67, 62, -5, -18, 47, 103, 50, -106, 53, 92, -37, -72, -53, 2, -48] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -77, 22, -111, -3, -18, -90, 110, -28, -75, 46, 73, -113, -121, 120, -127, -128, -20, -27, -79, -75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 78, 34, 84, 32, 24, -107, -26, -29, 110, -26, 15, -6, -6, -71, 18, -19, 6, 23, -113, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -60, -89, -79, -92, 123, 44, 113, -6, -37, -31, 75, -112, 117, -1, -60, 21, 96, -123, -119, 16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -82, 108, 5, -93, -109, 19, -30, -94, -25, -30, -41, 28, -42, -57, -16, 127, -56, 103, 83, -96] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -96, 115, 73, -103, 104, -36, -123, 91, 101, -29, -101, 40, 47, 87, -97, -67, 51, -68, 7, 72] certpath: NO - don't try this trustedCert STATUS:Passed. rerun: cd 'C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\scratch' && \ PATH='C:\cygwin64\usr\local\bin;C:\cygwin64\bin;C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\System32\WindowsPowerShell\v1.0;C:\WINDOWS\System32\OpenSSH;C:\Users\PRAJWALK\Documents\SRs\11u8_ssl\instantclient_19_8;C:\Users\PRAJWALK\Documents\SRs\11u8_ssl\instantclient_19_8;C:\Program Files\TortoiseHg;C:\Program Files (x86)\Microsoft Visual Studio 10.0\Common7\Tools;C:\Program Files (x86)\Microsoft SDKs\Windows\v7.0A\Bin\NETFX 4.0 Tools;C:\Program Files\Git\cmd;C:\Program Files\PuTTY;C:\Users\PRAJWALK\AppData\Local\Microsoft\WindowsApps;C:\Users\PRAJWALK\software\apache-maven-3.6.3-bin\apache-maven-3.6.3\bin;C:\Users\PRAJWALK\software\apache-cassandra-3.11.9\bin;C:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\bin\amd64;C:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\crt\src;C:\Program Files (x86)\Microsoft SDKs\Windows\v7.0A\Lib\x64;C:\Program Files (x86)\Microsoft Visual Studio 10.0\Common7\Tools;C:\Users\PRAJWALK\software\jdks\jdk-16\bin' \ SystemDrive=C: \ SystemRoot='C:\WINDOWS' \ TEMP='C:\cygwin64\tmp' \ TMP='C:\cygwin64\tmp' \ TZ=Asia/Kolkata \ windir='C:\WINDOWS' \ CLASSPATH='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification;C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification;c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261\lib\tools.jar;C:\cygwin64\home\PRAJWALK\tools\jtreg\lib\javatest.jar;C:\cygwin64\home\PRAJWALK\tools\jtreg\lib\jtreg.jar' \ 'c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261\bin\java' \ -Dtest.file='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification\ComodoCA.java' \ -Dtest.src='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.src.path='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.classes='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.class.path='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.vm.opts= \ -Dtest.tool.vm.opts= \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk='c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261' \ -Dcompile.jdk='c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261' \ -Dtest.timeout.factor=2.0 \ -Dtest.root='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test' \ -Djava.security.debug=certpath \ com.sun.javatest.regtest.agent.MainWrapper 'C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\closed\security\infra\java\security\cert\CertPathValidator\certification\ComodoCA.d\main.0.jta' OCSP ACTION: build -- Passed. All files up to date REASON: Named class compiled on demand TIME: 0.001 seconds messages: command: build ComodoCA reason: Named class compiled on demand elapsed time (seconds): 0.001 ACTION: main -- Passed. Execution successful REASON: User specified action: run main/othervm -Djava.security.debug=certpath ComodoCA CRL TIME: 1.265 seconds messages: command: main -Djava.security.debug=certpath ComodoCA CRL reason: User specified action: run main/othervm -Djava.security.debug=certpath ComodoCA CRL Mode: othervm [/othervm specified] elapsed time (seconds): 1.265 configuration: STDOUT: ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:16 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:57 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:49:42 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:GOOD ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: GOOD Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test ===================================================== CONFIGURATION ===================================================== PROXY_HOST :www-proxy.us.oracle.com PROXY_PORT :80 jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224 Revocation options :[NO_FALLBACK, PREFER_CRLS] OCSP responder set :null Trusted root set: false Expected EE Status:REVOKED Expected EE Revocation Date:Thu Jan 30 14:50:04 IST 2014 ===================================================== Received exception: java.security.cert.CertPathValidatorException: validity check failed Expected Certificate status: REVOKED Certificate status after validation: EXPIRED WARNING: Certificate expired, skip the test STDERR: certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints.permits(): SHA1withRSA Variant: generic certpath: KeySizeConstraints.permits(): RSA certpath: Constraints.permits(): SHA1 Variant: generic certpath: PKIXCertPathValidator.engineValidate()... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -64, 122, -104, 104, -115, -119, -5, -85, 5, 100, 12, 17, 125, -86, 125, 101, -72, -54, -52, 78] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -16, -113, 89, 56, 0, -77, -11, -113, -102, -106, 12, -43, -21, -6, 123, -86, 23, -24, 19, 18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -82, 108, 5, -93, -109, 19, -30, -94, -25, -30, -41, 28, -42, -57, -16, 127, -56, 103, 83, -96] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 77, 38, 32, 34, -119, 75, -45, -43, -92, 10, -95, 111, -34, -30, 18, -127, -59, -15, 60, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -38, -69, 46, -86, -80, 12, -72, -120, 38, 81, 116, 92, 109, 3, -45, -64, -40, -113, 122, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -29, 113, -32, -98, -40, -89, 66, -39, -37, 113, -111, 107, -108, -109, -21, -61, -93, -47, 20, -93] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -75, 3, -9, 118, 59, 97, -126, 106, 18, -86, 24, 83, -21, 3, 33, -108, -65, -2, -50, -54] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -60, 121, -54, -114, -95, 78, 3, 29, 28, -36, 107, -37, 49, 91, -108, 62, 63, 48, 127, 45] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 96, 123, 102, 26, 69, 13, -105, -54, -119, 80, 47, 125, 4, -51, 52, -88, -1, -4, -3, 75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 3, -34, 80, 53, 86, -47, 76, -69, 102, -16, -93, -30, 27, 27, -61, -105, -78, 61, -47, 85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL certpath: X509CertSelector.match(SN: 10020 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 124, 12, 50, 31, -89, -39, 48, 127, -60, 125, 104, -93, 98, -88, -95, -50, -85, 7, 91, 39] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -19, -25, 111, 118, 90, -65, 96, -20, 73, 91, -58, -91, 119, -69, 114, 22, 113, -101, -60, 61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 9b7e0649a33e62b9d5ee90487129ef57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -99, -64, 103, -90, 12, 34, -39, 38, -11, 69, -85, -90, 101, 82, 17, 39, -40, 69, -84, 99] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -71, 9, -54, -100, 30, -37, -45, 108, 58, 107, -82, -19, 84, -15, 91, -109, 6, 53, 46, 94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -29, -108, -11, -79, 77, -23, -37, -95, 41, 91, 87, -117, 77, 118, 6, 118, -31, -47, -94, -118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 121, -76, 89, -26, 123, -74, -27, -28, 1, 115, -128, 8, -120, -56, 26, 88, -10, -23, -101, 110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -73, 99, -25, 26, -35, -115, -23, 8, -90, 85, -125, -92, -32, 106, 80, 65, 101, 17, 66, 73] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 30, 12, -9, -74, 103, -14, -31, -110, 38, 9, 69, -64, 85, 57, 46, 119, 63, 66, 74, -94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 57, -107, -117, 98, -117, 92, -55, -44, -128, -70, 88, 15, -105, 63, 21, 8, 67, -52, -104, -89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 61, -26, 41, 72, -101, -22, 7, -54, 33, 68, 74, 38, -34, 110, -34, -46, -125, -48, -97, 89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -65, 89, 32, 54, 0, 121, -96, -96, 34, 107, -116, -43, -14, 97, -46, -72, 44, -53, -126, 74] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 123, 91, 69, -49, -81, -50, -53, 122, -3, 49, -110, 26, 106, -74, -13, 70, -21, 87, 72, 80] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 10, -123, -87, 119, 101, 5, -104, 124, 64, -127, -8, 15, -105, 44, 56, -15, 10, -20, 60, -49] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -83, 108, -86, -108, 96, -100, -19, -28, -1, -6, 62, 10, 116, 43, 99, 3, -9, -74, 89, -65] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -14, -64, 19, -32, -126, 67, 62, -5, -18, 47, 103, 50, -106, 53, 92, -37, -72, -53, 2, -48] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -58, 23, -48, -68, -88, -22, 2, 67, -14, 27, 6, -103, 93, 43, -112, 32, -71, -41, -100, -28] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -53, -48, -67, -87, -31, -104, 5, 81, -95, 77, 55, -94, -125, 121, -50, -115, 29, 42, -28, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 8, 74, -96, -86, 88, -124, -45, 94, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -77, -37, 72, -92, -7, -95, -59, -40, -82, 54, 65, -52, 17, 99, 105, 98, 41, -68, 75, -58] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US certpath: X509CertSelector.match(SN: 1a5 Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -77, 22, -111, -3, -18, -90, 110, -28, -75, 46, 73, -113, -121, 120, -127, -128, -20, -27, -79, -75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -65, 95, -73, -47, -50, -35, 31, -122, -12, 91, 85, -84, -36, -41, 16, -62, 14, -87, -120, -25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -93, -105, -42, -13, 94, -94, 16, -31, -85, 69, -97, 60, 23, 100, 60, -18, 1, 112, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 58, -102, -123, 7, 16, 103, 40, -74, -17, -10, -67, 5, 65, 110, 32, -63, -108, -38, 15, -34] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 85, -28, -127, -47, 17, -128, -66, -40, -119, -71, 8, -93, 49, -7, -95, 36, 9, 22, -71, 112] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -27, -99, 89, 48, -126, 71, 88, -52, -84, -6, 8, 84, 54, -122, 123, 58, -75, 4, 77, -16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 127, -45, 101, -89, -62, -35, -20, -69, -16, 48, 9, -13, 67, 57, -6, 2, -81, 51, 49, 51] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 106, 114, 38, 122, -48, 30, -17, 125, -25, 59, 105, 81, -44, 108, -115, -97, -112, 18, 102, -85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 26, -124, 98, -68, 72, 76, 51, 37, 4, -44, -18, -48, -10, 3, -60, 25, 70, -47, -108, 107] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 117, 113, -89, 25, 72, 25, -68, -99, -99, -22, 65, 71, -33, -108, -60, 72, 119, -103, -45, 121] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 84, -80, 123, -83, 69, -72, -30, 64, 127, -5, 10, 110, -5, -66, 51, -55, 60, -93, -124, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 3c9131cb1ff6d01b0e9ab8d044bf12be Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 71, -72, -51, -1, -27, 111, -18, -8, -78, -20, 47, 78, 14, -7, 37, -80, -114, 60, 107, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 82, -40, -120, 58, -56, -97, 120, 102, -19, -119, -13, 123, 56, 112, -108, -55, 2, 2, 54, -48] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 91, 37, 123, -106, -92, 101, 81, 126, -72, 57, -13, -64, 120, 102, 94, -24, 58, -25, -16, -18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 23, -96, -51, -63, -28, 65, -74, 58, 91, 59, -53, 69, -99, -67, 28, -62, -104, -6, -122, 88] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -113, -16, 75, 127, -88, 46, 69, 36, -82, 77, 80, -6, 99, -102, -117, -34, -30, -35, 27, -68] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 80, -81, -52, 7, -121, 21, 71, 111, 56, -59, -76, 101, -47, -34, -107, -86, -23, -33, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -1, 24, 40, 118, -7, 72, 5, 44, -95, -82, -15, 43, 27, 43, -78, 83, -8, 75, 124, -77] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -101, -30, 7, 87, 103, 28, 30, -64, 106, 6, -34, 89, -76, -102, 45, -33, -36, 25, -122, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -102, -81, 41, 122, -64, 17, 53, 53, 38, 81, 48, 0, -61, 106, -2, 64, -43, -82, -42, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 78, 34, 84, 32, 24, -107, -26, -29, 110, -26, 15, -6, -6, -71, 18, -19, 6, 23, -113, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 44, -43, 80, 65, -105, 21, -117, -16, -113, 54, 97, 91, 74, -5, 107, -39, -103, -55, 51, -110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 8, 118, -51, -53, 7, -1, 36, -10, -59, -51, -19, -69, -112, -68, -30, -124, 55, 70, 117, -9] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -99, -109, -58, 83, -117, 94, -54, -81, 63, -97, 30, 15, -27, -103, -107, -68, 36, -10, -108, -113] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -55, -128, 119, -32, 98, -110, -126, -11, 70, -100, -13, -70, -9, 76, -61, -34, -72, -93, -83, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -45, -108, -118, 76, 98, 19, 42, 25, 46, -52, -81, 114, -118, 125, 54, -41, -102, 28, -36, 103] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 83, 121, -65, 90, -86, 43, 74, -49, 84, -128, -31, -40, -101, -64, -99, -14, -78, 3, 102, -53] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -58, 79, -94, 61, 6, 99, -124, 9, -100, -50, 98, -28, 4, -84, -115, 92, -75, -23, -74, 27] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -20, -41, -29, -126, -46, 113, 93, 100, 76, -33, 46, 103, 63, -25, -70, -104, -82, 28, 15, 79] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -19, 68, 25, -64, -45, -16, 6, -117, -18, -92, 123, -66, 66, -25, 38, 84, -56, -114, 54, 118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -96, 115, 73, -103, 104, -36, -123, 91, 101, -29, -101, 40, 47, 87, -97, -67, 51, -68, 7, 72] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 23, 21, -123, -119, 9, 47, 36, -121, 111, 63, 29, 27, -28, -14, -106, 121, -125, 72, 19, -50] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -60, -89, -79, -92, 123, 44, 113, -6, -37, -31, 75, -112, 117, -1, -60, 21, 96, -123, -119, 16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -100, 95, 0, -33, -86, 1, -41, 48, 43, 56, -120, -94, -72, 109, 74, -100, -14, 17, -111, -125] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -16, 40, 117, -127, -41, 65, -128, -31, -52, -58, -69, -104, 17, 44, 98, -14, 26, 84, -14, 97] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -50, -61, 74, -71, -103, 85, -14, -72, -37, 96, -65, -87, 126, -67, 86, -75, -105, 54, -89, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 7dd9fe07cfa81eb7107967fba78934c6 Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -74, 119, -6, 105, 72, 71, -97, 83, 18, -43, -62, -22, 7, 50, 118, 7, -47, -105, 7, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 36122296c5e338a520a1d25f4cd70954 Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 69, -21, -94, -81, -12, -110, -53, -126, 49, 45, 81, -117, -89, -89, 33, -99, -13, 109, -56, 15] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 67c8e1e8e3be1cbdfc913b8ea6238749 Issuer: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 104, -112, -28, 103, -92, -90, 83, -128, -57, -122, 102, -92, -15, -9, 75, 67, -5, -124, -67, 109] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -80, 12, -16, 76, 48, -12, 5, 88, 2, 72, -3, 51, -27, 82, -81, 75, -124, -29, 102, 82] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -83, -67, -104, 122, 52, -76, 38, -9, -6, -60, 38, 84, -17, 3, -67, -32, 36, -53, 84, 26] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -7, 36, -84, 15, -78, -75, -8, 121, -64, -6, 96, -120, 27, -60, -39, 77, 2, -98, 23, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -45, -20, -57, 58, 101, 110, -52, -31, -38, 118, -102, 86, -5, -100, -13, -122, 109, 87, -27, -127] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -102, -40, 0, 48, 0, -25, 107, 127, -123, 24, -18, -117, -74, -50, -118, 12, -8, 17, -31, -69] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: b92f60cc889fa17a4609b85b706c8aaf Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, -117, 75, 109, -19, -45, 41, -71, 6, 25, -20, 57, 57, -87, -16, -105, -124, 106, -53, -17, -33] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 7, 31, -46, -25, -100, -38, -62, 110, -94, 64, -76, -80, 122, 80, 16, 80, 116, -60, -56, -67] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] Cert's: [4, 20, 21, 95, 53, 87, 81, 85, -5, 37, -78, -83, 3, 105, -4, 1, -93, -6, -66, 17, 85, -43] certpath: NO - don't try this trustedCert certpath: X509CertSelector.match(SN: 4caaf9cadb636fe01ff74ed85b03869d Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: Constraints: MD2 certpath: Constraints: MD5 certpath: Constraints: SHA1 jdkCA & usage TLSServer certpath: Constraints set to jdkCA. certpath: Constraints usage length is 1 certpath: Constraints: RSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: DSA keySize < 1024 certpath: Constraints set to keySize: keySize < 1024 certpath: Constraints: EC keySize < 224 certpath: Constraints set to keySize: keySize < 224 certpath: AlgorithmChecker.contains: SHA384withRSA certpath: AnchorCertificate.contains: matched CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB certpath: trustedMatch = true certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB ... Output overflow: JT Harness has limited the test output to the text at the beginning and the end, so that you can see how the test began, and how it completed. If you need to see more of the output from the test, set the system property javatest.maxOutputSize to a higher value. The current value is 100000 ... : AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -74, 119, -6, 105, 72, 71, -97, 83, 18, -43, -62, -22, 7, 50, 118, 7, -47, -105, 7, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -80, 12, -16, 76, 48, -12, 5, 88, 2, 72, -3, 51, -27, 82, -81, 75, -124, -29, 102, 82] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -60, -89, -79, -92, 123, 44, 113, -6, -37, -31, 75, -112, 117, -1, -60, 21, 96, -123, -119, 16] certpath: NO - don't try this trustedCert certpath: PKIXCertPathValidator.engineValidate()... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -75, 3, -9, 118, 59, 97, -126, 106, 18, -86, 24, 83, -21, 3, 33, -108, -65, -2, -50, -54] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 10, -123, -87, 119, 101, 5, -104, 124, 64, -127, -8, 15, -105, 44, 56, -15, 10, -20, 60, -49] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -77, 22, -111, -3, -18, -90, 110, -28, -75, 46, 73, -113, -121, 120, -127, -128, -20, -27, -79, -75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -29, 113, -32, -98, -40, -89, 66, -39, -37, 113, -111, 107, -108, -109, -21, -61, -93, -47, 20, -93] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -58, 23, -48, -68, -88, -22, 2, 67, -14, 27, 6, -103, 93, 43, -112, 32, -71, -41, -100, -28] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -53, -48, -67, -87, -31, -104, 5, 81, -95, 77, 55, -94, -125, 121, -50, -115, 29, 42, -28, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 69, -21, -94, -81, -12, -110, -53, -126, 49, 45, 81, -117, -89, -89, 33, -99, -13, 109, -56, 15] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 117, 113, -89, 25, 72, 25, -68, -99, -99, -22, 65, 71, -33, -108, -60, 72, 119, -103, -45, 121] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 85, -28, -127, -47, 17, -128, -66, -40, -119, -71, 8, -93, 49, -7, -95, 36, 9, 22, -71, 112] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -77, -37, 72, -92, -7, -95, -59, -40, -82, 54, 65, -52, 17, 99, 105, 98, 41, -68, 75, -58] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -1, 24, 40, 118, -7, 72, 5, 44, -95, -82, -15, 43, 27, 43, -78, 83, -8, 75, 124, -77] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -101, -30, 7, 87, 103, 28, 30, -64, 106, 6, -34, 89, -76, -102, 45, -33, -36, 25, -122, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 71, -72, -51, -1, -27, 111, -18, -8, -78, -20, 47, 78, 14, -7, 37, -80, -114, 60, 107, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -69, -81, 126, 2, 61, -6, -90, -15, 60, -124, -114, -83, -18, 56, -104, -20, -39, 50, 50, -44] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -19, -25, 111, 118, 90, -65, 96, -20, 73, 91, -58, -91, 119, -69, 114, 22, 113, -101, -60, 61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -38, -19, 100, 116, 20, -100, 20, 60, -85, -35, -103, -87, -67, 91, 40, 77, -117, 60, -55, -40] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -27, -99, 89, 48, -126, 71, 88, -52, -84, -6, 8, 84, 54, -122, 123, 58, -75, 4, 77, -16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -3, -38, 20, -60, -97, 48, -34, 33, -67, 30, 66, 57, -4, -85, 99, 35, 73, -32, -15, -124] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 23, -96, -51, -63, -28, 65, -74, 58, 91, 59, -53, 69, -99, -67, 28, -62, -104, -6, -122, 88] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -16, 40, 117, -127, -41, 65, -128, -31, -52, -58, -69, -104, 17, 44, 98, -14, 26, 84, -14, 97] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -29, -108, -11, -79, 77, -23, -37, -95, 41, 91, 87, -117, 77, 118, 6, 118, -31, -47, -94, -118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 8, 74, -96, -86, 88, -124, -45, 94, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 96, 123, 102, 26, 69, 13, -105, -54, -119, 80, 47, 125, 4, -51, 52, -88, -1, -4, -3, 75] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -64, 122, -104, 104, -115, -119, -5, -85, 5, 100, 12, 17, 125, -86, 125, 101, -72, -54, -52, 78] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 7, 31, -46, -25, -100, -38, -62, 110, -94, 64, -76, -80, 122, 80, 16, 80, 116, -60, -56, -67] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 91, 37, 123, -106, -92, 101, 81, 126, -72, 57, -13, -64, 120, 102, 94, -24, 58, -25, -16, -18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 78, 34, 84, 32, 24, -107, -26, -29, 110, -26, 15, -6, -6, -71, 18, -19, 6, 23, -113, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 7dd9fe07cfa81eb7107967fba78934c6 Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -85, -74, -37, -41, 6, -98, 55, -84, 48, -122, 7, -111, 112, -57, -100, -60, 25, -79, 120, -64] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -117, 75, 109, -19, -45, 41, -71, 6, 25, -20, 57, 57, -87, -16, -105, -124, 106, -53, -17, -33] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 124, 12, 50, 31, -89, -39, 48, 127, -60, 125, 104, -93, 98, -88, -95, -50, -85, 7, 91, 39] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 80, -81, -52, 7, -121, 21, 71, 111, 56, -59, -76, 101, -47, -34, -107, -86, -23, -33, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 127, -45, 101, -89, -62, -35, -20, -69, -16, 48, 9, -13, 67, 57, -6, 2, -81, 51, 49, 51] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 36122296c5e338a520a1d25f4cd70954 Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 58, -102, -123, 7, 16, 103, 40, -74, -17, -10, -67, 5, 65, 110, 32, -63, -108, -38, 15, -34] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 61, -26, 41, 72, -101, -22, 7, -54, 33, 68, 74, 38, -34, 110, -34, -46, -125, -48, -97, 89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US certpath: X509CertSelector.match(SN: 1a5 Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -73, 99, -25, 26, -35, -115, -23, 8, -90, 85, -125, -92, -32, 106, 80, 65, 101, 17, 66, 73] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 23, 21, -123, -119, 9, 47, 36, -121, 111, 63, 29, 27, -28, -14, -106, 121, -125, 72, 19, -50] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -50, -61, 74, -71, -103, 85, -14, -72, -37, 96, -65, -87, 126, -67, 86, -75, -105, 54, -89, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -96, 115, 73, -103, 104, -36, -123, 91, 101, -29, -101, 40, 47, 87, -97, -67, 51, -68, 7, 72] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 26, -124, 98, -68, 72, 76, 51, 37, 4, -44, -18, -48, -10, 3, -60, 25, 70, -47, -108, 107] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -102, -40, 0, 48, 0, -25, 107, 127, -123, 24, -18, -117, -74, -50, -118, 12, -8, 17, -31, -69] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 123, 91, 69, -49, -81, -50, -53, 122, -3, 49, -110, 26, 106, -74, -13, 70, -21, 87, 72, 80] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -83, -67, -104, 122, 52, -76, 38, -9, -6, -60, 38, 84, -17, 3, -67, -32, 36, -53, 84, 26] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -93, -105, -42, -13, 94, -94, 16, -31, -85, 69, -97, 60, 23, 100, 60, -18, 1, 112, -100, -52] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -99, -64, 103, -90, 12, 34, -39, 38, -11, 69, -85, -90, 101, 82, 17, 39, -40, 69, -84, 99] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: b92f60cc889fa17a4609b85b706c8aaf Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 121, -76, 89, -26, 123, -74, -27, -28, 1, 115, -128, 8, -120, -56, 26, 88, -10, -23, -101, 110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 9b7e0649a33e62b9d5ee90487129ef57 Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 3, -34, 80, 53, 86, -47, 76, -69, 102, -16, -93, -30, 27, 27, -61, -105, -78, 61, -47, 85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -65, 95, -73, -47, -50, -35, 31, -122, -12, 91, 85, -84, -36, -41, 16, -62, 14, -87, -120, -25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA certpath: X509CertSelector.match(SN: 67c8e1e8e3be1cbdfc913b8ea6238749 Issuer: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 21, 95, 53, 87, 81, 85, -5, 37, -78, -83, 3, 105, -4, 1, -93, -6, -66, 17, 85, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL certpath: X509CertSelector.match(SN: 10020 Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 66, 50, -74, 22, -6, 4, -3, -2, 93, 75, 122, -61, -3, -9, 76, 64, 29, 90, 67, -81] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -16, -113, 89, 56, 0, -77, -11, -113, -102, -106, 12, -43, -21, -6, 123, -86, 23, -24, 19, 18] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 77, 38, 32, 34, -119, 75, -45, -43, -92, 10, -95, 111, -34, -30, 18, -127, -59, -15, 60, 46] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: no subject key ID extension. Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US certpath: X509CertSelector.match(SN: 3c9131cb1ff6d01b0e9ab8d044bf12be Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US) certpath: X509CertSelector.match: subject DNs don't match certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -55, -128, 119, -32, 98, -110, -126, -11, 70, -100, -13, -70, -9, 76, -61, -34, -72, -93, -83, 57] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -20, -41, -29, -126, -46, 113, 93, 100, 76, -33, 46, 103, 63, -25, -70, -104, -82, 28, 15, 79] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -80, 12, -16, 76, 48, -12, 5, 88, 2, 72, -3, 51, -27, 82, -81, 75, -124, -29, 102, 82] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -79, 62, -61, 105, 3, -8, -65, 71, 1, -44, -104, 38, 26, 8, 2, -17, 99, 100, 43, -61] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -38, -69, 46, -86, -80, 12, -72, -120, 38, 81, 116, 92, 109, 3, -45, -64, -40, -113, 122, -42] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -100, 95, 0, -33, -86, 1, -41, 48, 43, 56, -120, -94, -72, 109, 74, -100, -14, 17, -111, -125] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -74, 119, -6, 105, 72, 71, -97, 83, 18, -43, -62, -22, 7, 50, 118, 7, -47, -105, 7, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -45, -108, -118, 76, 98, 19, 42, 25, 46, -52, -81, 114, -118, 125, 54, -41, -102, 28, -36, 103] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 57, -107, -117, 98, -117, 92, -55, -44, -128, -70, 88, 15, -105, 63, 21, 8, 67, -52, -104, -89] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -58, 79, -94, 61, 6, 99, -124, 9, -100, -50, 98, -28, 4, -84, -115, 92, -75, -23, -74, 27] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 8, 118, -51, -53, 7, -1, 36, -10, -59, -51, -19, -69, -112, -68, -30, -124, 55, 70, 117, -9] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 83, 121, -65, 90, -86, 43, 74, -49, 84, -128, -31, -40, -101, -64, -99, -14, -78, 3, 102, -53] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -83, 108, -86, -108, 96, -100, -19, -28, -1, -6, 62, 10, 116, 43, 99, 3, -9, -74, 89, -65] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -124, 24, -52, -123, 52, -20, -68, 12, -108, -108, 46, 8, 89, -100, -57, -78, 16, 78, 10, 8] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -60, 121, -54, -114, -95, 78, 3, 29, 28, -36, 107, -37, 49, 91, -108, 62, 63, 48, 127, 45] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -14, -64, 19, -32, -126, 67, 62, -5, -18, 47, 103, 50, -106, 53, 92, -37, -72, -53, 2, -48] certpath: NO - don't try this trustedCert certpath: X509CertSelector.match(SN: 5c8b99c55a94c5d27156decd8980cc26 Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US) certpath: X509CertSelector.match returning: true certpath: YES - try this trustedCert certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: AlgorithmChecker.contains: SHA384withECDSA certpath: AnchorCertificate.contains: matched CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: trustedMatch = true certpath: -------------------------------------------------------------- certpath: Executing PKIX certification path validation algorithm. certpath: Checking cert1 - Subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA384withECDSA Variant: generic certpath: KeySizeConstraints.permits(): EC certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 1, maxPathLength = 2 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 1 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 2.5.29.32.0 certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy ROOT certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:03 IST 2021... certpath: validity verified. certpath: ---checking subject/issuer name chaining... certpath: subject/issuer name chaining verified. certpath: ---checking signature... certpath: signature verified. certpath: BasicChecker.updateState issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US; subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US; serial#: 146910433462551487119872777360491570703 certpath: -checker6 validation succeeded certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker] certpath: RevocationChecker.check: checking cert SN: 6e85eb98 71602754 42d67a92 64f6660f Subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: RevocationChecker.checkCRLs() ---checking revocation status ... certpath: RevocationChecker.checkCRLs() possible crls.size() = 0 certpath: RevocationChecker.checkCRLs() approved crls.size() = 0 certpath: DistributionPointFetcher.getCRLs: Checking CRLDPs for CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: Trying to fetch CRL from DP http://crl.trust-provider.com/USERTrustECCCertificationAuthority.crl certpath: CertStore URI:http://crl.trust-provider.com/USERTrustECCCertificationAuthority.crl certpath: URICertStore.getInstance: cache hit certpath: Returning CRL from cache certpath: DistributionPointFetcher.verifyCRL: checking revocation status for SN: 6e85eb98 71602754 42d67a92 64f6660f Subject: CN=USERTrust ECC Code Signing CA, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US certpath: Constraints.permits(): SHA384withECDSA Variant: generic certpath: Returning 1 CRLs certpath: RevocationChecker.checkApprovedCRLs() starting the final sweep... certpath: RevocationChecker.checkApprovedCRLs() cert SN: 146910433462551487119872777360491570703 certpath: -checker7 validation succeeded certpath: cert1 validation succeeded. certpath: Checking cert2 - Subject: CN=COMODO CA Limited, O=COMODO CA Limited, STREET=7 Campus Road, L=Bradford, ST=West Yorkshire, OID.2.5.4.17=BD7 1HR, C=US certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] certpath: -checker1 validation succeeded certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] certpath: Constraints.permits(): SHA256withECDSA Variant: generic certpath: KeySizeConstraints.permits(): EC certpath: -checker2 validation succeeded certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] certpath: -checker3 validation succeeded certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] certpath: ---checking basic constraints... certpath: i = 2, maxPathLength = 0 certpath: after processing, maxPathLength = 0 certpath: basic constraints verified. certpath: ---checking name constraints... certpath: prevNC = null, newNC = null certpath: mergedNC = null certpath: name constraints verified. certpath: -checker4 validation succeeded certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... certpath: PolicyChecker.checkPolicy() certIndex = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.processPolicies() policiesCritical = false certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.6449.1.2.1.3.2 certpath: PolicyChecker.processParents(): matchAny = false certpath: PolicyChecker.processParents(): matchAny = true certpath: PolicyChecker.processParents() found parent: anyPolicy CRIT: false EP: anyPolicy (1) certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy ROOT anyPolicy CRIT: false EP: anyPolicy (1) 1.3.6.1.4.1.6449.1.2.1.3.2 CRIT: false EP: 1.3.6.1.4.1.6449.1.2.1.3.2 (2) certpath: PolicyChecker.checkPolicy() certificate policies verified certpath: -checker5 validation succeeded certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] certpath: ---checking validity:Thu Jun 24 18:47:03 IST 2021... certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -7, 36, -84, 15, -78, -75, -8, 121, -64, -6, 96, -120, 27, -60, -39, 77, 2, -98, 23, 25] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 44, -43, 80, 65, -105, 21, -117, -16, -113, 54, 97, 91, 74, -5, 107, -39, -103, -55, 51, -110] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -19, 68, 25, -64, -45, -16, 6, -117, -18, -92, 123, -66, 66, -25, 38, 84, -56, -114, 54, 118] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -65, 89, 32, 54, 0, 121, -96, -96, 34, 107, -116, -43, -14, 97, -46, -72, 44, -53, -126, 74] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -71, 9, -54, -100, 30, -37, -45, 108, 58, 107, -82, -19, 84, -15, 91, -109, 6, 53, 46, 94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -60, -89, -79, -92, 123, 44, 113, -6, -37, -31, 75, -112, 117, -1, -60, 21, 96, -123, -119, 16] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -46, -60, -80, -46, -111, -44, 76, 17, 113, -77, 97, -53, 61, -95, -2, -35, -88, 106, -44, -29] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 84, -80, 123, -83, 69, -72, -30, 64, 127, -5, 10, 110, -5, -66, 51, -55, 60, -93, -124, -43] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -102, -81, 41, 122, -64, 17, 53, 53, 38, 81, 48, 0, -61, 106, -2, 64, -43, -82, -42, 60] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 30, 12, -9, -74, 103, -14, -31, -110, 38, 9, 69, -64, 85, 57, 46, 119, 63, 66, 74, -94] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -99, -109, -58, 83, -117, 94, -54, -81, 63, -97, 30, 15, -27, -103, -107, -68, 36, -10, -108, -113] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -82, 108, 5, -93, -109, 19, -30, -94, -25, -30, -41, 28, -42, -57, -16, 127, -56, 103, 83, -96] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -45, -20, -57, 58, 101, 110, -52, -31, -38, 118, -102, 86, -5, -100, -13, -122, 109, 87, -27, -127] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 82, -40, -120, 58, -56, -97, 120, 102, -19, -119, -13, 123, 56, 112, -108, -55, 2, 2, 54, -48] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -113, -16, 75, 127, -88, 46, 69, 36, -82, 77, 80, -6, 99, -102, -117, -34, -30, -35, 27, -68] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 106, 114, 38, 122, -48, 30, -17, 125, -25, 59, 105, 81, -44, 108, -115, -97, -112, 18, 102, -85] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, -96, 17, 10, 35, 62, -106, -15, 7, -20, -30, -81, 41, -17, -126, -91, 127, -48, 48, -92, -76] certpath: NO - don't try this trustedCert certpath: AdaptableX509CertSelector.match: subject key IDs don't match. Expected: [4, 20, 58, -31, 9, -122, -44, -49, 25, -62, -106, 118, 116, 73, 118, -36, -32, 53, -58, 99, 99, -102] Cert's: [4, 20, 104, -112, -28, 103, -92, -90, 83, -128, -57, -122, 102, -92, -15, -9, 75, 67, -5, -124, -67, 109] certpath: NO - don't try this trustedCert STATUS:Passed. rerun: cd 'C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\scratch' && \ PATH='C:\cygwin64\usr\local\bin;C:\cygwin64\bin;C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\System32\WindowsPowerShell\v1.0;C:\WINDOWS\System32\OpenSSH;C:\Users\PRAJWALK\Documents\SRs\11u8_ssl\instantclient_19_8;C:\Users\PRAJWALK\Documents\SRs\11u8_ssl\instantclient_19_8;C:\Program Files\TortoiseHg;C:\Program Files (x86)\Microsoft Visual Studio 10.0\Common7\Tools;C:\Program Files (x86)\Microsoft SDKs\Windows\v7.0A\Bin\NETFX 4.0 Tools;C:\Program Files\Git\cmd;C:\Program Files\PuTTY;C:\Users\PRAJWALK\AppData\Local\Microsoft\WindowsApps;C:\Users\PRAJWALK\software\apache-maven-3.6.3-bin\apache-maven-3.6.3\bin;C:\Users\PRAJWALK\software\apache-cassandra-3.11.9\bin;C:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\bin\amd64;C:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\crt\src;C:\Program Files (x86)\Microsoft SDKs\Windows\v7.0A\Lib\x64;C:\Program Files (x86)\Microsoft Visual Studio 10.0\Common7\Tools;C:\Users\PRAJWALK\software\jdks\jdk-16\bin' \ SystemDrive=C: \ SystemRoot='C:\WINDOWS' \ TEMP='C:\cygwin64\tmp' \ TMP='C:\cygwin64\tmp' \ TZ=Asia/Kolkata \ windir='C:\WINDOWS' \ CLASSPATH='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification;C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification;c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261\lib\tools.jar;C:\cygwin64\home\PRAJWALK\tools\jtreg\lib\javatest.jar;C:\cygwin64\home\PRAJWALK\tools\jtreg\lib\jtreg.jar' \ 'c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261\bin\java' \ -Dtest.file='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification\ComodoCA.java' \ -Dtest.src='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.src.path='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.classes='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.class.path='C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\classes\closed\security\infra\java\security\cert\CertPathValidator\certification' \ -Dtest.vm.opts= \ -Dtest.tool.vm.opts= \ -Dtest.compiler.opts= \ -Dtest.java.opts= \ -Dtest.jdk='c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261' \ -Dcompile.jdk='c:\Users\PRAJWALK\software\jdks\jdk1.8.0_261' \ -Dtest.timeout.factor=2.0 \ -Dtest.root='C:\cygwin64\home\PRAJWALK\repos\jdk8u-cpu-v2\jdk\test' \ -Djava.security.debug=certpath \ com.sun.javatest.regtest.agent.MainWrapper 'C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork\closed\security\infra\java\security\cert\CertPathValidator\certification\ComodoCA.d\main.1.jta' CRL TEST RESULT: Passed. Execution successful -------------------------------------------------- Test results: passed: 1 Report written to C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTreport\html\report.html Results written to C:\cygwin64\home\PRAJWALK\tools\jtreg\bin\JTwork