Forgive the multiple posts. I am a nubie to the list server and it doesn't
want to include the .log file.
So, I renamed it to .txt and hopefully it works this time.

    Dale

----- Original Message ----- 
From: "Dale McIntosh" <[EMAIL PROTECTED]>
To: "Commons HttpClient Project" <[EMAIL PROTECTED]>
Sent: Saturday, September 25, 2004 1:38 PM
Subject: Re: Problems using AuthSSLProtocolSocketFactory to send Client
Certificate in HTTPS session handshake


> Sorry the log didn't get attached
>
>     Dale
> ----- Original Message ----- 
> From: "Dale McIntosh" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Saturday, September 25, 2004 1:26 PM
> Subject: Problems using AuthSSLProtocolSocketFactory to send Client
> Certificate in HTTPS session handshake
>
>
> > I have been trying for quite a wile to get the
> AuthSSLProtocolSocketFactory
> > to send a client certificate and it  doesn't seem to be working. I am
> > wondering if the server (Oracle single sign-on server) is requesting the
> > client cert. When the request is made from a browser, the browser does
> send
> > the client cert. I have attached, my application, it is relatively
simple
> > and a debug log.  The debug options I used were -
> > javax.net.debug="ssl,handshake,keymanager".
> >
> > I have looked at the debug log and I do not see a certificate request.
> > However, when IE is used, IE sends a client certificate.
> >
> > Any help would be appreciated.
> >
> >             Thanks,
> >             Dale McIntosh
> >
>
>
> --------------------------------------------------------------------------
--
> ----
>
>
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail:
> [EMAIL PROTECTED]
> > For additional commands, e-mail:
> [EMAIL PROTECTED]
>
>


----------------------------------------------------------------------------
----


> ---------------------------------------------------------------------
> To unsubscribe, e-mail:
[EMAIL PROTECTED]
> For additional commands, e-mail:
[EMAIL PROTECTED]
Host = training.testserver.com, , Port = -1
***
found key for : d2a7f47d3105d37daa523ef80afb1927_7b71fbce-dff3-42c2-9259-d2367eb8daa9
chain [0] = [
[
  Version: V3
  Subject: [EMAIL PROTECTED], CN=Thawte Freemail Member
  Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

  Key:  SunJSSE RSA public key:
  public exponent:
    010001
  modulus:
    cbb8c9f4 64963972 d5fbdcde 61655f17 31b893f9 2dd0b411 26299e80 7cf3ca2c
    be81e9af d1ae5e30 acd0f248 7d51fa50 74c89474 dbc088d5 b6462e85 f5f1201b
    54a2c943 882eeacf 82e50dd4 0426a248 b28a052b 72a6123c 2e340a32 92a23f18
    d44a26bf 5be8fd63 e593e260 a5f59246 c3b4d5e2 2dd28c41 2e72f3cf 69d5677d
  Validity: [From: Fri Sep 10 09:29:47 PDT 2004,
               To: Sat Sep 10 09:29:47 PDT 2005]
  Issuer: CN=Thawte Personal Freemail Issuing CA, O=Thawte Consulting (Pty) Ltd., C=ZA
  SerialNumber: [    0d04c7]

Certificate Extensions: 2
[1]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: [EMAIL PROTECTED]

[2]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:false
PathLen: undefined
]

]
  Algorithm: [MD5withRSA]
  Signature:
0000: 12 AF 0E D6 47 04 C0 E2   ED E0 1F A6 37 00 F5 39  ....G.......7..9
0010: E1 22 54 CE 35 36 62 16   B2 C3 BB 4F E3 B0 53 A0  ."T.56b....O..S.
0020: A6 12 C1 77 E2 79 29 63   2C C4 72 AC 02 4D 99 A6  ...w.y)c,.r..M..
0030: 31 A2 B2 EA 0B D1 48 7B   A7 0F E3 97 01 39 D2 36  1.....H......9.6
0040: 41 9D 5E C2 66 57 8D 32   AB 13 6B 9E 42 A0 C6 D0  A.^.fW.2..k.B...
0050: 67 9F 12 20 02 5B 3C CF   CE 76 4D D1 CD 8E 9B 6D  g.. .[<..vM....m
0060: 9D C9 D2 B2 F4 F4 93 03   76 CC 7D 08 C1 24 EE DE  ........v....$..
0070: DC 3F EF 8B ED 24 F4 CB   78 1F 55 A3 9E 63 17 FD  .?...$..x.U..c..

]
***
adding as trusted cert:
  Subject: CN=training.testserver.mil, ****Removed****
  Issuer:  ****Removed****
  Algorithm: RSA; Serial number: 0x14b3a
  Valid from Thu Jul 29 13:24:29 PDT 2004 until Mon Jul 30 13:24:29 PDT 2007

adding as trusted cert:
  Subject: CN=www.testserver.com, ****Removed****
  Issuer:  ****Removed****
  Algorithm: RSA; Serial number: 0x16781
  Valid from Fri Aug 27 17:23:29 PDT 2004 until Tue Aug 28 17:23:29 PDT 2007

trigger seeding of SecureRandom
done seeding SecureRandom
setSoTimeout(0) called
setSoTimeout(0) called
%% No cached client session
*** ClientHello, TLSv1
RandomCookie:  GMT: 1096032192 bytes = { 50, 189, 35, 73, 156, 109, 92, 71, 163, 110, 
142, 93, 50, 67, 211, 217, 133, 117, 203, 97, 78, 144, 7, 214, 191, 90, 14, 182 }
Session ID:  {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, 
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, 
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, 
SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods:  { 0 }
***
main, WRITE: TLSv1 Handshake, length = 73
main, WRITE: SSLv2 client hello message, length = 98
main, READ: SSLv3 Handshake, length = 58
*** ServerHello, SSLv3
RandomCookie:  GMT: 1096031998 bytes = { 250, 12, 41, 15, 44, 68, 83, 138, 127, 197, 
36, 15, 48, 9, 155, 75, 82, 160, 9, 50, 168, 36, 181, 170, 138, 232, 105, 110 }
Session ID:  {188, 114, 29, 102, 45, 132, 225, 115, 133, 127, 142, 213, 97, 20, 219, 
31}
Cipher Suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
***
%% Created:  [Session-1, SSL_RSA_WITH_3DES_EDE_CBC_SHA]
** SSL_RSA_WITH_3DES_EDE_CBC_SHA
main, READ: SSLv3 Handshake, length = 2680
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: CN=training.testserver.com, ****Removed****
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  SunJSSE RSA public key:
  public exponent:
    010001
  modulus:
    a492f678 9edfe880 9b843f59 a0a386e2 781db4fb 0253e22e 07110d45 a76f6575
    a3925eda f2067e55 43488207 4d2c4cc9 3eb52bf0 756b1fd6 b86bd56a 9ddc1232
    f8ec0b85 56a39a39 7cfe0287 a7fce7ea f6b522c2 87157023 4fd7c518 2ee83036
    1344f856 f67caa5f d77ec6f1 83db946d 858ffd0b 65063ee7 c7e9dd9a 15dc3d57
  Validity: [From: Thu Jul 29 13:24:29 PDT 2004,
               To: Mon Jul 30 13:24:29 PDT 2007]
  Issuer: ****Removed****
  SerialNumber: [    014b3a]

Certificate Extensions: 6
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 63 88 3A 0C 0A 70 4A 4D   5E 09 D5 24 76 C3 88 3A  c.:..pJM^..$v..:
0010: 9A 30 66 19                                        .0f.
]
]

[2]: ObjectId: 2.5.29.18 Criticality=false
IssuerAlternativeName [
[URIName:****Removed****]]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 02 C5 1F 43 11 73 60 32   37 3E E6 47 86 29 DE 21  ...C.s`27>.G.).!
0010: B6 72 66 23                                        .rf#
]

]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName:  ****Removed****]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.16.840.1.101.2.1.11.5]
[]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 5A 92 42 6D 1A 11 86 9A   5B 71 D2 32 53 BC FA 21  Z.Bm....[q.2S..!
0010: 07 4C 76 A2 FF 97 43 C1   72 16 0E 09 D8 D4 87 8C  .Lv...C.r.......
0020: E7 3A BB 09 D2 AF 72 70   2E 9C 13 D3 F4 A8 08 EA  .:....rp........
0030: 23 F4 C9 81 B1 13 07 57   8F D9 51 47 5A D9 15 70  #......W..QGZ..p
0040: A3 7B 21 D4 6F 69 57 00   D4 83 3D B2 40 59 97 4E  [EMAIL PROTECTED]
0050: 76 16 93 62 A9 A3 88 02   65 01 08 81 F8 75 0C AD  v..b....e....u..
0060: FC BF 02 FA 69 41 5D 8D   60 70 49 9D 14 11 C3 23  ....iA].`pI....#
0070: EA 6F 17 6A FA BD D3 78   68 3B BC 60 54 82 A2 98  .o.j...xh;.`T...

]
chain [1] = [
[
  Version: V3
  Subject: ****Removed****
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  SunJSSE RSA public key:
  public exponent:
    010001
  modulus:
    bc04a424 4fafcab8 3ca8b8af 27ec0940 caf672d4 a02899dd dc97ff67 7667a13a
    883efaa5 ceec575f 238f8adc c52a9ba4 c50bf396 a6dbed0f 0181b3f2 caa1ad0b
    8da2032f 0ca08c6f e439046b cc770ac6 7a6896e9 9624cd9e 5496404f 875f2145
    372df596 3e899a26 07c05546 073386f2 a171ed3f 5609282d 06cc5782 49970ed5
  Validity: [From: Wed Jun 04 03:12:06 PDT 2003,
               To: Tue Jun 02 03:12:06 PDT 2009]
  Issuer:****Removed****
  SerialNumber: [    24]

Certificate Extensions: 8
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 02 C5 1F 43 11 73 60 32   37 3E E6 47 86 29 DE 21  ...C.s`27>.G.).!
0010: B6 72 66 23                                        .rf#
]
]

[2]: ObjectId: 2.5.29.18 Criticality=false
IssuerAlternativeName [
[URIName: ****Removed****]]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 6C 9C A5 F0 5C 8F 6D 41   8D C4 17 3B 90 57 C2 0F  l...\.mA...;.W..
0010: A3 CD 6D FE                                        ..m.
]

]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: ****Removed****]
]]

[5]: ObjectId: 2.5.29.36 Criticality=false
PolicyConstraints: [  Require: 0;       Inhibit: unspecified ]

[6]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.16.840.1.101.2.1.11.5]
[]  ]
  [CertificatePolicyId: [2.16.840.1.101.2.1.11.9]
[]  ]
  [CertificatePolicyId: [2.16.840.1.101.2.1.11.10]
[]  ]
]

[7]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

[8]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: B4 EA 8C 4C 69 79 99 D2   F7 56 9D 84 A0 89 8B AA  ...Liy...V......
0010: F1 D3 A4 5D A7 3A A9 CC   16 7C 78 4F CC E2 8D 71  ...].:....xO...q
0020: FC 8F 4F DB 1C 8D 34 00   86 D8 25 E5 60 CB D6 32  ..O...4...%.`..2
0030: 2F 3D D7 B3 11 19 5A F7   32 C1 34 6A D1 79 0B B3  /=....Z.2.4j.y..
0040: C1 2D CA 07 44 EA 56 4D   24 0D CF C7 71 67 3E 60  .-..D.VM$...qg>`
0050: 53 C1 A5 D3 0D A1 80 EB   DE 5C 7A 6A 7A EC BF 39  S........\zjz..9
0060: 6E FC 66 D8 85 57 9E BF   75 8B A9 25 55 CC D8 F7  n.f..W..u..%U...
0070: 43 29 71 60 54 C0 17 8A   F2 9C 4F 76 C7 2A D9 89  C)q`T.....Ov.*..

]
chain [2] = [
[
  Version: V3
  Subject:****Removed****
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  SunJSSE RSA public key:
  public exponent:
    010001
  modulus:
    b530fe64 beeacc6d ed812cf7 7fe919ba 0e696a28 e1a9a9cb 95581ff1 e69a6953
    e0883f91 c551b963 97a8e621 8c135e36 3ca857fa f8702c4c 6acbbf30 a74c16e4
    325cf812 b051f816 578d2fb4 4dfa2ea8 94e82a61 d4570d47 ce6e2c2f 7e9867cc
    0008abb6 961635c2 8591e55b a00ac766 5262f361 759517ae bc2a5629 a5e02b53
  Validity: [From: Fri May 19 06:13:00 PDT 2000,
               To: Thu May 14 06:13:00 PDT 2020]
  Issuer:****Removed****
  SerialNumber: [    04]

Certificate Extensions: 2
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 6C 9C A5 F0 5C 8F 6D 41   8D C4 17 3B 90 57 C2 0F  l...\.mA...;.W..
0010: A3 CD 6D FE                                        ..m.
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:true
PathLen:2147483647
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: AF 71 44 F9 97 23 CC 68   69 8C 43 07 41 BA 88 20  .qD..#.hi.C.A.. 
0010: B3 22 00 41 C8 98 A0 55   1C CD 3F 6E B1 93 5C AD  .".A...U..?n..\.
0020: FA 18 9A BB 1C 73 6F FD   24 42 8F 87 9F 51 CF BE  .....so.$B...Q..
0030: 86 9F E9 D7 8A 48 4F 08   D9 69 94 AC 3F E6 0F 2D  .....HO..i..?..-
0040: 97 0F 28 93 76 4F 62 DF   FF A0 CD 61 F8 A6 86 0C  ..(.vOb....a....
0050: 31 34 20 DC 7F 2F A8 FB   39 BE 95 EE 38 59 02 62  14 ../..9...8Y.b
0060: C1 DE 6C 15 4F E0 DF 9D   BB E4 79 73 24 FD 63 64  ..l.O.....ys$.cd
0070: 95 F7 4A A8 99 1F 48 65   95 C7 7B BF 78 32 E7 7A  ..J...He....x2.z

]
***
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:  Server certificate 1:
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Subject DN: CN=training.testserver.com, ****Removed****
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Signature Algorithm: SHA1withRSA
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid from: Thu Jul 29 13:24:29 PDT 2004
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid until: Mon Jul 30 13:24:29 PDT 2007
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Issuer: ****Removed****
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:  Server certificate 2:
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Subject DN: ****Removed****
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Signature Algorithm: SHA1withRSA
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid from: Wed Jun 04 03:12:06 PDT 2003
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid until: Tue Jun 02 03:12:06 PDT 2009
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Issuer:****Removed****
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:  Server certificate 3:
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Subject DN:****Removed****
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Signature Algorithm: SHA1withRSA
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid from: Fri May 19 06:13:00 PDT 2000
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Valid until: Thu May 14 06:13:00 PDT 2020
Sep 24, 2004 6:27:28 AM 
org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted
INFO:   Issuer:****Removed****
Found trusted certificate:
[
[
  Version: V3
  Subject: CN=training.testserver.com, ****Removed****
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  SunJSSE RSA public key:
  public exponent:
    010001
  modulus:
    a492f678 9edfe880 9b843f59 a0a386e2 781db4fb 0253e22e 07110d45 a76f6575
    a3925eda f2067e55 43488207 4d2c4cc9 3eb52bf0 756b1fd6 b86bd56a 9ddc1232
    f8ec0b85 56a39a39 7cfe0287 a7fce7ea f6b522c2 87157023 4fd7c518 2ee83036
    1344f856 f67caa5f d77ec6f1 83db946d 858ffd0b 65063ee7 c7e9dd9a 15dc3d57
  Validity: [From: Thu Jul 29 13:24:29 PDT 2004,
               To: Mon Jul 30 13:24:29 PDT 2007]
  Issuer: ****Removed****
  SerialNumber: [    014b3a]

Certificate Extensions: 6
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 63 88 3A 0C 0A 70 4A 4D   5E 09 D5 24 76 C3 88 3A  c.:..pJM^..$v..:
0010: 9A 30 66 19                                        .0f.
]
]

[2]: ObjectId: 2.5.29.18 Criticality=false
IssuerAlternativeName [
[URIName:****Removed****]]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 02 C5 1F 43 11 73 60 32   37 3E E6 47 86 29 DE 21  ...C.s`27>.G.).!
0010: B6 72 66 23                                        .rf#
]

]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName:  ****Removed****]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.16.840.1.101.2.1.11.5]
[]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 5A 92 42 6D 1A 11 86 9A   5B 71 D2 32 53 BC FA 21  Z.Bm....[q.2S..!
0010: 07 4C 76 A2 FF 97 43 C1   72 16 0E 09 D8 D4 87 8C  .Lv...C.r.......
0020: E7 3A BB 09 D2 AF 72 70   2E 9C 13 D3 F4 A8 08 EA  .:....rp........
0030: 23 F4 C9 81 B1 13 07 57   8F D9 51 47 5A D9 15 70  #......W..QGZ..p
0040: A3 7B 21 D4 6F 69 57 00   D4 83 3D B2 40 59 97 4E  [EMAIL PROTECTED]
0050: 76 16 93 62 A9 A3 88 02   65 01 08 81 F8 75 0C AD  v..b....e....u..
0060: FC BF 02 FA 69 41 5D 8D   60 70 49 9D 14 11 C3 23  ....iA].`pI....#
0070: EA 6F 17 6A FA BD D3 78   68 3B BC 60 54 82 A2 98  .o.j...xh;.`T...

]
main, READ: SSLv3 Handshake, length = 4
*** ServerHelloDone
JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding
*** ClientKeyExchange, RSA PreMasterSecret, SSLv3
Random Secret:  { 3, 0, 236, 50, 218, 190, 230, 21, 151, 98, 106, 76, 42, 36, 135, 25, 
223, 143, 250, 212, 250, 36, 236, 88, 172, 19, 45, 75, 124, 254, 236, 117, 114, 168, 
163, 192, 115, 157, 241, 103, 102, 231, 231, 168, 146, 202, 67, 192 }
main, WRITE: SSLv3 Handshake, length = 132
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 EC 32 DA BE E6 15   97 62 6A 4C 2A 24 87 19  ...2.....bjL*$..
0010: DF 8F FA D4 FA 24 EC 58   AC 13 2D 4B 7C FE EC 75  .....$.X..-K...u
0020: 72 A8 A3 C0 73 9D F1 67   66 E7 E7 A8 92 CA 43 C0  r...s..gf.....C.
CONNECTION KEYGEN:
Client Nonce:
0000: 41 54 20 C0 32 BD 23 49   9C 6D 5C 47 A3 6E 8E 5D  AT .2.#I.m\G.n.]
0010: 32 43 D3 D9 85 75 CB 61   4E 90 07 D6 BF 5A 0E B6  2C...u.aN....Z..
Server Nonce:
0000: 41 54 1F FE FA 0C 29 0F   2C 44 53 8A 7F C5 24 0F  AT....).,DS...$.
0010: 30 09 9B 4B 52 A0 09 32   A8 24 B5 AA 8A E8 69 6E  0..KR..2.$....in
Master Secret:
0000: 07 78 78 1F 09 DE 09 94   FD C1 D7 50 16 EF 3E 71  .xx........P..>q
0010: 55 63 AB 2C 9E 5E BE CE   FC 3A F6 6E 0B 78 F8 DA  Uc.,.^...:.n.x..
0020: 81 8A 82 A4 AF 98 4F C4   53 29 39 80 20 A1 B8 BB  ......O.S)9. ...
Client MAC write Secret:
0000: BF AF 8C 42 38 97 90 75   B0 01 1E E8 E7 39 56 A9  ...B8..u.....9V.
0010: 0D EA 57 B3                                        ..W.
Server MAC write Secret:
0000: 39 DC 51 87 AF 54 1D 41   00 09 08 53 AF 60 CB D5  9.Q..T.A...S.`..
0010: A8 9A 44 FE                                        ..D.
Client write key:
0000: 9A 14 13 7D 15 B1 BF DF   44 0A 5B FA 75 B8 16 20  ........D.[.u.. 
0010: 4B AE 84 D3 FC C3 27 1A                            K.....'.
Server write key:
0000: EA 41 68 61 31 FA 03 74   24 AD 44 76 8A 64 29 F9  .Aha1..t$.Dv.d).
0010: C3 24 CE 4D 5E 3C 02 33                            .$.M^<.3
Client write IV:
0000: 67 7A D7 13 35 42 11 47                            gz..5B.G
Server write IV:
0000: 87 31 3D D9 44 97 EF F5                            .1=.D...
main, WRITE: SSLv3 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
*** Finished
verify_data:  { 72, 115, 58, 111, 170, 49, 30, 10, 67, 74, 78, 110, 251, 86, 111, 130, 
142, 54, 213, 29, 121, 141, 16, 78, 175, 109, 145, 29, 6, 107, 133, 173, 114, 39, 106, 
193 }
***
main, WRITE: SSLv3 Handshake, length = 64
main, READ: SSLv3 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
main, READ: SSLv3 Handshake, length = 64
*** Finished
verify_data:  { 174, 197, 250, 111, 79, 125, 29, 137, 142, 43, 125, 190, 111, 200, 
245, 140, 222, 198, 137, 26, 220, 155, 194, 161, 206, 52, 96, 90, 143, 124, 249, 4, 
244, 56, 72, 185 }
***
%% Cached client session: [Session-1, SSL_RSA_WITH_3DES_EDE_CBC_SHA]
main, WRITE: SSLv3 Application Data, length = 168
main, READ: SSLv3 Application Data, length = 1120
Response String : <html>
 <meta http-equiv="pragma" content="no-cache">
 <meta http-equiv="expires" content="Sat, 11 Jul 1970 17:55:19 PST">
 <body onload="document.SsoServerForm.submit()">
  <form method=post 
action="https://trainingsso.testserver.com/pls/orasso/orasso.wwsso_app_admin.ls_login"; 
name="SsoServerForm">
   <input type=hidden name="Site2pstoreToken" 
value="v1.2~1324~36706AE50820A164D16C6EB33017CFC6FAC4ACFD3E69862C45697599AE1CB856FDFB16BE475A9E4A433681F82B4E1175DE43979864501B93E8386895BF95D181CFB9550200AE0760C3DD8A28A11D696462A5A74ADE57C5CBECAC62F6A69E08EB5B9DF8250AB74E686650F51AC4A9BF6EBDF0D45DB0E1C0E1DD2B197F3E143B680C6EA744CBB7120A2AFD25CC3285CC19442A2E288EF6A15796AD8D3C59A053DD1B7D211ED76CA4E1454A8E63C27738F46CE646926F47258C8952F5A59853A21FF9F2C4C0A7739D1B6C2E3C218F9EA97FD214526358F8A4E091D98B22E67F4897">
  </form>
 </body>
</html>

setSoTimeout(0) called
main, WRITE: SSLv3 Application Data, length = 272
main, WRITE: SSLv3 Application Data, length = 272
main, WRITE: SSLv3 Application Data, length = 4120
main, WRITE: SSLv3 Application Data, length = 4120
main, WRITE: SSLv3 Application Data, length = 4120
main, WRITE: SSLv3 Application Data, length = 4120
main, WRITE: SSLv3 Application Data, length = 576
main, READ: SSLv3 Application Data, length = 864
Sep 24, 2004 6:27:29 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody
WARNING: Going to buffer response body of large or unknown size. Using 
getResponseAsStream instead is recommended.
main, called close()
main, called closeInternal(true)
main, SEND SSLv3 ALERT:  warning, description = close_notify
main, WRITE: SSLv3 Alert, length = 24
Exception sending event file


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to