• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Liutauras Vilda
  • Paul Clapham
Sheriffs:
  • paul wheaton
  • Tim Cooke
  • Henry Wong
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Piet Souris
Bartenders:
  • Mike London

java.io.IOException: unsupported keyword

 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

We encountered an error when trying to make a secure connection/https posts to URL "java.io.IOException: unsupported keyword ?". We are using JDK 1.3.1, Weblogic 6.1SP5 in SUN Solaris.

We have imported the following "Comodo Class 3 Security Services CA"/GTE Cuber Trust to the truststore. We were able to do a secure connection to other URL who are using verisign certs.

What could be the problem of the unsupported keyword error? Could this be because of Comodo because we can posts data to a verisign registered URL?

The following are the error message from the logs:

ExecuteThread: '11' for queue: 'default', READ: SSL v3.1 Handshake, length = 4
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ClientKeyExchange, RSA PreMasterSecret, v3.1
Random Secret: { 3, 1, 198, 212, 42, 114, 97, 255, 150, 212, 92, 210, 203, 124, 134, 162, 36, 188, 184, 25, 149, 126, 168, 218, 249, 200, 71, 102, 88, 110, 23, 16, 223, 173, 20, 233, 69, 34, 136, 233, 155, 1, 112, 11, 143, 193, 81, 91 }
[write] MD5 and SHA1 hashes: len = 134
0000: 10 00 00 82 00 80 6F 53 BA C4 AC 19 BC 1E 5F 61 ......oS......_a
0010: D2 64 E0 E9 51 C5 E5 11 CB 22 D9 80 3E 22 43 97 .d..Q...."..>"C.
0020: 24 30 1B 37 3A 1E 9B C9 0C AC 17 4E 26 8D 23 1C $0.7:......N&.#.
0030: 71 43 A3 44 37 F2 35 36 08 E7 32 B0 B7 47 8F 75 qC.D7.56..2..G.u
0040: 41 C0 92 A5 C5 1B 82 B4 7E 94 5B 83 83 4D 1E 74 A.........[..M.t
0050: A2 9A 16 63 B9 9B B1 69 98 03 E8 09 ED 6F 09 E8 ...c...i.....o..
0060: 0B BF 47 E3 7C F4 60 D3 29 80 BD ED FF 0D A2 0D ..G...`.).......
0070: 1F 95 79 DE E1 5A 9E C2 E7 B4 F0 AA 4E 4E D3 1E ..y..Z......NN..
0080: 2C 9E 85 89 6E F9 ,...n.
ExecuteThread: '11' for queue: 'default', WRITE: SSL v3.1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 C6 D4 2A 72 61 FF 96 D4 5C D2 CB 7C 86 A2 ....*ra...\.....
0010: 24 BC B8 19 95 7E A8 DA F9 C8 47 66 58 6E 17 10 $.........GfXn..
0020: DF AD 14 E9 45 22 88 E9 9B 01 70 0B 8F C1 51 5B ....E"....p...Q[
CONNECTION KEYGEN:
Client Nonce:
0000: 43 1B B8 DD 31 B6 3F 1C 0F 19 83 51 BC A9 BB 74 C...1.?....Q...t
0010: 4C 1F 11 2A 94 84 14 73 C0 E5 B3 42 6B F5 B4 93 L..*...s...Bk...
Server Nonce:
0000: 43 1B B8 DE A6 6A 4F FF 66 60 F9 56 A4 0F 2E 36 C....jO.f`.V...6
0010: 4C 8A 0B 54 BB CF D9 52 97 77 A9 FD 00 00 00 00 L..T...R.w......
Master Secret:
0000: 0D D4 49 CE 19 6F 31 D3 3A 86 B9 ED 50 0D A1 1A ..I..o1.:...P...
0010: 39 BD 00 5B ED 6F A6 5D F0 4A 5B CD A7 B9 22 AC 9..[.o.].J[...".
0020: 9D BC 7C AD E1 26 4A AB E6 7D 3B A8 CE 16 A6 A6 .....&J...;.....
Client MAC write Secret:
0000: 2B F2 50 71 E3 0B CF 01 FF 7A 9E 29 0D C3 80 59 +.Pq.....z.)...Y
0010: 5A 9C 07 36 Z..6
Server MAC write Secret:
0000: 1F 8C B2 FC 84 AB 35 DA 34 5B BD F1 B7 C5 7B 76 ......5.4[.....v
0010: 4A C4 6C FF J.l.
Client write key:
0000: AB 6B AE 85 B2 29 79 1C CF 80 3F 72 09 7C 50 FB .k...)y...?r..P.
Server write key:
0000: 23 6C 02 93 6D 6F B2 B5 C7 79 00 20 5B C9 60 54 #l..mo...y. [.`T
... no IV for cipher
ExecuteThread: '11' for queue: 'default', WRITE: SSL v3.1 Change Cipher Spec, length = 1
*** Finished, v3.1
verify_data: { 15, 145, 23, 212, 93, 153, 187, 89, 187, 27, 175, 81 }
***
[write] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 0F 91 17 D4 5D 99 BB 59 BB 1B AF 51 ........]..Y...Q
Plaintext before ENCRYPTION: len = 36
0000: 14 00 00 0C 0F 91 17 D4 5D 99 BB 59 BB 1B AF 51 ........]..Y...Q
0010: CE 92 F5 03 FD 84 1E B5 1E D0 B8 5D 50 71 30 CE ...........]Pq0.
0020: 10 CF E1 46 ...F
ExecuteThread: '11' for queue: 'default', WRITE: SSL v3.1 Handshake, length = 36
ExecuteThread: '11' for queue: 'default', READ: SSL v3.1 Change Cipher Spec, length = 1
ExecuteThread: '11' for queue: 'default', READ: SSL v3.1 Handshake, length = 36
Plaintext after DECRYPTION: len = 36
0000: 14 00 00 0C 6A 9A 5E 4B 75 8D 9C 15 27 3A 7A E4 ....j.^Ku...':z.
0010: E0 9F 65 0F BB 3B 1F 87 FC D3 CF 36 C2 72 01 A6 ..e..;.....6.r..
0020: 9F 8B 2B 79 ..+y
*** Finished, v3.1
verify_data: { 106, 154, 94, 75, 117, 141, 156, 21, 39, 58, 122, 228 }
***
%% Cached client session: [Session-1, SSL_RSA_WITH_RC4_128_SHA]
[read] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 6A 9A 5E 4B 75 8D 9C 15 27 3A 7A E4 ....j.^Ku...':z.
<05-Sep-2005 @ 11:17:50><Exception in https : java.io.IOException: unsupported keyword ?>

Please assist. Thanks.

Regards,
Premkumar
 
Ranch Hand
Posts: 541
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
For the sake of anyone who may find this thread via Google as it is one of the top results for this error:

This error is caused by a version of SSL Certificates that Java 1.3 can't cope with. The only known solution is to upgrade Java to 1.4
 
With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime.
reply
    Bookmark Topic Watch Topic
  • New Topic