This week's book giveaway is in the Testing forum.
We're giving away four copies of Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled Examples and have Jeremy Kubica on-line!
See this thread for details.

Mark Heron

Greenhorn
+ Follow
since Aug 19, 2010
Merit badge: grant badges
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Mark Heron

Tim,

In my application most of screens are showing data from two or more tables. Most of time we don't just query single entity. In such scenario should we use similar design? Is there any better approach? Are you performing table joins in higher level business tier using HQL / SQL? Also are you eager fetching all required data in business service?

Thanks
Hi,

Latest J2EE containters in market are trying to comply with basic profile so they can achieve Interoperability across diffrent platforms. Glassfish is no exception. As per WS basic profile 1.1 RPC/Encoded or Document/Encoded style is not allowed because it is a major source of conflicts. Remember, JAX-RPC is renamed to JAX-WS to avoid confusion created by word RPC in name.

Hope this helps.

Hello Everybody,

Please go through WSIT tutorial closely without any execuse for the certification. Expect around 20 questions based on Security and WSIT ground. I learned this hard way.

Regards

12 years ago
After not being capable of take it anymore than 4 months of frustration and confusion between pile of diffrent version of specifications and their jargons, I finally ended up on exam seat to face THE 310-230 and believe me it was horrible experience than my 3rd semester maths exam paper in college.

Most of questions (almost 40) were multiple choice. Some options were very close in wording that rip my brain apart. Exam had 65 questions. I had 43 right. Surprisingly, I was short of time at last.(was on question #43 and had 22 min left). because most of questions were based on practical situation and restrctions. So you have to read carefully. Exam interface didn't show what question I was on and how many left. I think this GPS facility should be added now.

Well, here is my(valuable) experience.
It started well with XML schema,WSDL,SOAP structures and WS-I. I was hoping to see more questions on JAXR,JAXP,SAAJ,UDDI. However, things went south when Security and WSIT comes into the picture. I was badly hurt in these two sections. I see 1 question on SAAJ,2 on UDDI, 4-5 on JAXR,2 questions on schema,4 questions on wsdl, 1 question on StAX, 7-8 questions on JAX-WS and design(SOA) each, 4-5 question on REST and JSON each, 3-4 question on Java EE(pkg,benefits of JEE container) Rest all credit goes to Security and WSIT.

I read Ivan and Mikalai study guide(Thank you very much guys. You save me.), two books on webservice basics, specification of SAAJ,JAXR,SOAP,WSDL,BP-1.0 and 1.1. I did all practical examples from Ivan's guide. My advice is read more articles on Security(ws-securitypolicy,ws-security,ws-trust,SAML,XKMS, XACML, encryption,digital signature) and WSIT(developement and challenges in C# and .NET, WCF client). I'm Java developer and that cost me in WSIT section. Also be pro on API methods.

What I read was not enough and that gave me brain stroke and trauma. Wish you all best of luck and take the exam seriously.

Thank you Ivan for your active support.

Best wishes,
12 years ago

Thanks Ivan for your explanation !!
Hi,

I was going through XKMS content from Mikalai's online study guide.(http://java.boot.by/scdjws5-guide/ch08s02.html) I came across this statement.

PKI refers to a set of security services for authentication, encryption and digital certificate management under which documents are encrypted with a private key and decrypted using a publicly available key accessible to the recipient via a network.


Shouldn't it be reverse like "...encrypted with a public key and decrypted using private key..."?

Thanks

Hi Steve,

<all minOccurs="0"> means combination of all elements can occur minimum zero times. In other words minOccurs value applies to group element <all> not individual element within <all></all> group. So in your case if you remove lines <engine>122</engine> and <wheels>33</wheels> XML validation succeed. If you change minOccurs="1"(Default) and do not provide <partsValues> group or provide empty <partsValues /> then it will complain about all 3 elements.

Hope this will help.

Thanks
Ivan,

You are the man. Your solution was perfect. Now I can access both Servlet based and EJB based webservice in two way SSL mode. Thanks a lot for bearing my curiosity.

5 cents from me. One study guide typo I want bring in your attention. You mentioned to create sun-web.xml and sun-ejb.xml for EJB based webservice in section 8.3. I guess correct file name is sun-ejb-jar.xml

Regards
Hi Ivan,

I uploaded my version of code at http://rapidshare.com/files/416310231/secureWS.zip Please have a look at it and let me know where I'm going wrong.

Thanks
Hi Ivan,

I must be making some silly mistake because my eye is not catching anything wrong in code. Did you make any other change not mentioned in your study guide? Can you share your code with me?

Thanks
Hi Ivan,

Thank you very much for investigating the problem. I updated Glassfish V3.0.1 configuration as you said and restart the server. However on running standalone client I'm seeing below error.It is diffrent than what I was facing earlier.

Exception in thread "main" javax.xml.ws.WebServiceException: Failed to access the WSDL at: https://localhost:8181/GreetingServletMutual/HelloWorldWSService?wsdl. It failed with:
Server returned HTTP response code: 403 for URL: https://localhost:8181/GreetingServletMutual/HelloWorldWSService?wsdl.
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.tryWithMex(RuntimeWSDLParser.java:151)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:133)
at com.sun.xml.internal.ws.client.WSServiceDelegate.parseWSDL(WSServiceDelegate.java:254)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:217)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:165)
at com.sun.xml.internal.ws.spi.ProviderImpl.createServiceDelegate(ProviderImpl.java:93)
at javax.xml.ws.Service.<init>(Service.java:56)
at com.ivan.HelloWorldWSService.<init>(HelloWorldWSService.java:47)
at com.ivan.client.HelloWSClient.callService(HelloWSClient.java:59)
at com.ivan.client.HelloWSClient.main(HelloWSClient.java:55)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.intellij.rt.execution.application.AppMain.main(AppMain.java:115)
Caused by: java.io.IOException: Server returned HTTP response code: 403 for URL: https://localhost:8181/GreetingServletMutual/HelloWorldWSService?wsdl
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1313)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:234)
at java.net.URL.openStream(URL.java:1010)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.createReader(RuntimeWSDLParser.java:793)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.resolveWSDL(RuntimeWSDLParser.java:251)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:118)

Do you have any input on this?

Thanks
Hi,

I'm running mutual authentication example for servlet based webservice from Ivan's study guide section 8.3 on GlassFish V3.0.1 app server. On running standalone client invocation I'm receiving below error. Access Control and one way SSL example works fine for me.

keyStore is : client_keystore.jks
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : client
chain [0] = [
[
Version: V1
Subject: CN=My Client, OU=Client Org Unit, O=Client Org, L=Client City, ST=Client State, C=US
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
3cfb619f 0da6a5c1 1589925e ba598596 9245f54a 8aa11645 ec58aaef fb8e8e3a
a0212e22 c741b01c 68b490b9 5d27502e a4d7777b cabd8ccf 56152f8e 9d31b845
07784868 5c3546e2 98e6f4f0 bc314359 13b39fc8 02eec529 41930176 e71dc15d
cb3089aa 6577851f 285066f3 b138d1bf 697b4c3d 9d03976b 661be100 48e9bc5b

Validity: [From: Thu Aug 26 11:45:09 CDT 2010,
To: Wed Nov 24 10:45:09 CST 2010]
Issuer: CN=My Client, OU=Client Org Unit, O=Client Org, L=Client City, ST=Client State, C=US
SerialNumber: [ 4c769a15]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 16 60 FF E4 19 3D A3 7D A8 78 38 02 0,...`...=...x8.
0010: A9 64 6A 3D 3E 42 FD EC 02 14 38 D0 A7 14 7A 52 .dj=>B....8...zR
0020: B9 3B 12 8D 43 0D F8 8A 30 01 6E FD AD 9F .;..C...0.n...

]
***
trustStore is: client_cacerts.jks
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Issuer: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Algorithm: RSA; Serial number: 0x4c0ed7b3
Valid from Tue Jun 08 18:52:19 CDT 2010 until Fri Jun 05 18:52:19 CDT 2020

trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1282859514 bytes = { 232, 177, 103, 9, 45, 205, 30, 49, 213, 193, 65, 63, 237, 178, 203, 126, 227, 107, 197, 0, 195, 95, 206, 108, 240, 148, 137, 49 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 4C 77 E2 FA E8 B1 67 09 2D CD ...E..Lw....g.-.
0010: 1E 31 D5 C1 41 3F ED B2 CB 7E E3 6B C5 00 C3 5F .1..A?.....k..._
0020: CE 6C F0 94 89 31 00 00 1E 00 04 00 05 00 2F 00 .l...1......../.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 73
[write] MD5 and SHA1 hashes: len = 98
0000: 01 03 01 00 39 00 00 00 20 00 00 04 01 00 80 00 ....9... .......
0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2.....
0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@...
0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................
0040: 00 11 4C 77 E2 FA E8 B1 67 09 2D CD 1E 31 D5 C1 ..Lw....g.-..1..
0050: 41 3F ED B2 CB 7E E3 6B C5 00 C3 5F CE 6C F0 94 A?.....k..._.l..
0060: 89 31 .1
main, WRITE: SSLv2 client hello message, length = 98
[Raw write]: length = 100
0000: 80 62 01 03 01 00 39 00 00 00 20 00 00 04 01 00 .b....9... .....
0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2...
0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@.
0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................
0040: 14 00 00 11 4C 77 E2 FA E8 B1 67 09 2D CD 1E 31 ....Lw....g.-..1
0050: D5 C1 41 3F ED B2 CB 7E E3 6B C5 00 C3 5F CE 6C ..A?.....k..._.l
0060: F0 94 89 31 ...1
[Raw read]: length = 5
0000: 16 03 01 02 F0 .....
[Raw read]: length = 752
0000: 02 00 00 46 03 01 4C 77 E2 FA 23 E5 1B 76 1F 3C ...F..Lw..#..v.<
0010: 53 5D 68 44 70 DD EC 6E 71 19 DB 1B 29 13 CF 31 S]hDp..nq...)..1
0020: 6E 70 C2 87 A7 D9 20 4C 77 E2 FA 9D 3F 9C BC 87 np.... Lw...?...
0030: 8A FA FB 96 F7 DA 2D 61 D9 71 E0 62 E1 E2 2B CC ......-a.q.b..+.
0040: 46 9C B8 15 88 EF 41 00 04 00 0B 00 02 9E 00 02 F.....A.........
0050: 9B 00 02 98 30 82 02 94 30 82 01 FD A0 03 02 01 ....0...0.......
0060: 02 02 04 4C 0E D7 B3 30 0D 06 09 2A 86 48 86 F7 ...L...0...*.H..
0070: 0D 01 01 05 05 00 30 7D 31 0B 30 09 06 03 55 04 ......0.1.0...U.
0080: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U....
0090: 43 61 6C 69 66 6F 72 6E 69 61 31 14 30 12 06 03 California1.0...
00A0: 55 04 07 13 0B 53 61 6E 74 61 20 43 6C 61 72 61 U....Santa Clara
00B0: 31 1B 30 19 06 03 55 04 0A 13 12 4F 72 61 63 6C 1.0...U....Oracl
00C0: 65 20 43 6F 72 70 6F 72 61 74 69 6F 6E 31 12 30 e Corporation1.0
00D0: 10 06 03 55 04 0B 13 09 47 6C 61 73 73 46 69 73 ...U....GlassFis
00E0: 68 31 12 30 10 06 03 55 04 03 13 09 6C 6F 63 61 h1.0...U....loca
00F0: 6C 68 6F 73 74 30 1E 17 0D 31 30 30 36 30 38 32 lhost0...1006082
0100: 33 35 32 31 39 5A 17 0D 32 30 30 36 30 35 32 33 35219Z..20060523
0110: 35 32 31 39 5A 30 7D 31 0B 30 09 06 03 55 04 06 5219Z0.1.0...U..
0120: 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 ..US1.0...U....C
0130: 61 6C 69 66 6F 72 6E 69 61 31 14 30 12 06 03 55 alifornia1.0...U
0140: 04 07 13 0B 53 61 6E 74 61 20 43 6C 61 72 61 31 ....Santa Clara1
0150: 1B 30 19 06 03 55 04 0A 13 12 4F 72 61 63 6C 65 .0...U....Oracle
0160: 20 43 6F 72 70 6F 72 61 74 69 6F 6E 31 12 30 10 Corporation1.0.
0170: 06 03 55 04 0B 13 09 47 6C 61 73 73 46 69 73 68 ..U....GlassFish
0180: 31 12 30 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 1.0...U....local
0190: 68 6F 73 74 30 81 9F 30 0D 06 09 2A 86 48 86 F7 host0..0...*.H..
01A0: 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 ..........0.....
01B0: 00 93 5B 1D 8C A9 C9 0D 4C 8C 06 6D BB 03 AC 3B ..[.....L..m...;
01C0: 5D BC 42 B7 C3 C8 24 8E F7 BF E3 89 FF B8 71 7A ].B...$.......qz
01D0: EE 2D 42 30 FA BA A8 6E 63 4C 60 DB 18 ED 37 3A .-B0...ncL`...7:
01E0: 27 66 9A 56 7A 6E FC 6F 7A E9 E7 17 2F AC D4 5E 'f.Vzn.oz.../..^
01F0: C7 D9 69 AA F4 12 B8 3C A6 E5 DF 36 BE 75 27 7D ..i....<...6.u'.
0200: 85 AF 47 7E F2 28 E0 B0 37 39 68 AC B2 9E 79 67 ..G..(..79h...yg
0210: FD 92 E4 3F 8D ED 0B 2F 89 40 EC 99 73 2E AF D2 ...?.../.@..s...
0220: 26 F1 DA 3A 81 98 A7 17 C0 E3 17 49 80 49 E6 9C &..:.......I.I..
0230: 07 02 03 01 00 01 A3 21 30 1F 30 1D 06 03 55 1D .......!0.0...U.
0240: 0E 04 16 04 14 EB EF 2D 92 BB 2D 5D 07 B0 FD 37 .......-..-]...7
0250: 11 32 D9 3B 63 B2 7C 73 D4 30 0D 06 09 2A 86 48 .2.;c..s.0...*.H
0260: 86 F7 0D 01 01 05 05 00 03 81 81 00 16 7D 74 21 ..............t!
0270: 33 BE 16 84 90 C6 A0 8A E8 70 03 4C BA B0 42 8C 3........p.L..B.
0280: FD FA 54 12 D0 51 92 58 F7 80 CF C7 93 43 BA DB ..T..Q.X.....C..
0290: 75 57 9F 03 ED E1 3B E9 00 0A AD 26 90 68 C2 B3 uW....;....&.h..
02A0: 10 C9 B3 30 09 CD A7 2B E1 03 36 5A 29 6B 2D 12 ...0...+..6Z)k-.
02B0: 9B 36 50 0F 9E DE 26 30 19 5D 27 44 34 CB 64 59 .6P...&0.]'D4.dY
02C0: 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 48 6D 23 0D H......m..0.Hm#.
02D0: F9 38 4E EB 03 FF AC DE 4D F3 20 05 56 43 4B E8 .8N.....M. .VCK.
02E0: CC 83 42 00 7F 20 DF 7F 86 66 45 61 0E 00 00 00 ..B.. ...fEa....
main, READ: TLSv1 Handshake, length = 752
*** ServerHello, TLSv1
RandomCookie: GMT: 1282859514 bytes = { 35, 229, 27, 118, 31, 60, 83, 93, 104, 68, 112, 221, 236, 110, 113, 25, 219, 27, 41, 19, 207, 49, 110, 112, 194, 135, 167, 217 }
Session ID: {76, 119, 226, 250, 157, 63, 156, 188, 135, 138, 250, 251, 150, 247, 218, 45, 97, 217, 113, 224, 98, 225, 226, 43, 204, 70, 156, 184, 21, 136, 239, 65}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
[read] MD5 and SHA1 hashes: len = 74
0000: 02 00 00 46 03 01 4C 77 E2 FA 23 E5 1B 76 1F 3C ...F..Lw..#..v.<
0010: 53 5D 68 44 70 DD EC 6E 71 19 DB 1B 29 13 CF 31 S]hDp..nq...)..1
0020: 6E 70 C2 87 A7 D9 20 4C 77 E2 FA 9D 3F 9C BC 87 np.... Lw...?...
0030: 8A FA FB 96 F7 DA 2D 61 D9 71 E0 62 E1 E2 2B CC ......-a.q.b..+.
0040: 46 9C B8 15 88 EF 41 00 04 00 F.....A...
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus: 103476845748620715542290158352552555093264732266451674754844075400351516698831428551155347844995838551626340282893429600444363416063149937375329202383853147577890011014834771591190580506467978926663872132742910637975131558926563105340719768686380076500399618522663192552278442404435084378459058183339543796743
public exponent: 65537
Validity: [From: Tue Jun 08 18:52:19 CDT 2010,
To: Fri Jun 05 18:52:19 CDT 2020]
Issuer: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
SerialNumber: [ 4c0ed7b3]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: EB EF 2D 92 BB 2D 5D 07 B0 FD 37 11 32 D9 3B 63 ..-..-]...7.2.;c
0010: B2 7C 73 D4 ..s.
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 03 4C ..t!3........p.L
0010: BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 CF C7 ..B...T..Q.X....
0020: 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A AD 26 .C..uW....;....&
0030: 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 36 5A .h.....0...+..6Z
0040: 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 27 44 )k-..6P...&0.]'D
0050: 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 4.dYH......m..0.
0060: 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 20 05 Hm#..8N.....M. .
0070: 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 45 61 VCK...B.. ...fEa

]
***
Found trusted certificate:
[
[
Version: V3
Subject: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus: 103476845748620715542290158352552555093264732266451674754844075400351516698831428551155347844995838551626340282893429600444363416063149937375329202383853147577890011014834771591190580506467978926663872132742910637975131558926563105340719768686380076500399618522663192552278442404435084378459058183339543796743
public exponent: 65537
Validity: [From: Tue Jun 08 18:52:19 CDT 2010,
To: Fri Jun 05 18:52:19 CDT 2020]
Issuer: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
SerialNumber: [ 4c0ed7b3]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: EB EF 2D 92 BB 2D 5D 07 B0 FD 37 11 32 D9 3B 63 ..-..-]...7.2.;c
0010: B2 7C 73 D4 ..s.
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 03 4C ..t!3........p.L
0010: BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 CF C7 ..B...T..Q.X....
0020: 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A AD 26 .C..uW....;....&
0030: 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 36 5A .h.....0...+..6Z
0040: 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 27 44 )k-..6P...&0.]'D
0050: 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 4.dYH......m..0.
0060: 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 20 05 Hm#..8N.....M. .
0070: 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 45 61 VCK...B.. ...fEa

]
[read] MD5 and SHA1 hashes: len = 674
0000: 0B 00 02 9E 00 02 9B 00 02 98 30 82 02 94 30 82 ..........0...0.
0010: 01 FD A0 03 02 01 02 02 04 4C 0E D7 B3 30 0D 06 .........L...0..
0020: 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 7D 31 0B .*.H........0.1.
0030: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0..
0040: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California
0050: 31 14 30 12 06 03 55 04 07 13 0B 53 61 6E 74 61 1.0...U....Santa
0060: 20 43 6C 61 72 61 31 1B 30 19 06 03 55 04 0A 13 Clara1.0...U...
0070: 12 4F 72 61 63 6C 65 20 43 6F 72 70 6F 72 61 74 .Oracle Corporat
0080: 69 6F 6E 31 12 30 10 06 03 55 04 0B 13 09 47 6C ion1.0...U....Gl
0090: 61 73 73 46 69 73 68 31 12 30 10 06 03 55 04 03 assFish1.0...U..
00A0: 13 09 6C 6F 63 61 6C 68 6F 73 74 30 1E 17 0D 31 ..localhost0...1
00B0: 30 30 36 30 38 32 33 35 32 31 39 5A 17 0D 32 30 00608235219Z..20
00C0: 30 36 30 35 32 33 35 32 31 39 5A 30 7D 31 0B 30 0605235219Z0.1.0
00D0: 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 ...U....US1.0...
00E0: 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 U....California1
00F0: 14 30 12 06 03 55 04 07 13 0B 53 61 6E 74 61 20 .0...U....Santa
0100: 43 6C 61 72 61 31 1B 30 19 06 03 55 04 0A 13 12 Clara1.0...U....
0110: 4F 72 61 63 6C 65 20 43 6F 72 70 6F 72 61 74 69 Oracle Corporati
0120: 6F 6E 31 12 30 10 06 03 55 04 0B 13 09 47 6C 61 on1.0...U....Gla
0130: 73 73 46 69 73 68 31 12 30 10 06 03 55 04 03 13 ssFish1.0...U...
0140: 09 6C 6F 63 61 6C 68 6F 73 74 30 81 9F 30 0D 06 .localhost0..0..
0150: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
0160: 30 81 89 02 81 81 00 93 5B 1D 8C A9 C9 0D 4C 8C 0.......[.....L.
0170: 06 6D BB 03 AC 3B 5D BC 42 B7 C3 C8 24 8E F7 BF .m...;].B...$...
0180: E3 89 FF B8 71 7A EE 2D 42 30 FA BA A8 6E 63 4C ....qz.-B0...ncL
0190: 60 DB 18 ED 37 3A 27 66 9A 56 7A 6E FC 6F 7A E9 `...7:'f.Vzn.oz.
01A0: E7 17 2F AC D4 5E C7 D9 69 AA F4 12 B8 3C A6 E5 ../..^..i....<..
01B0: DF 36 BE 75 27 7D 85 AF 47 7E F2 28 E0 B0 37 39 .6.u'...G..(..79
01C0: 68 AC B2 9E 79 67 FD 92 E4 3F 8D ED 0B 2F 89 40 h...yg...?.../.@
01D0: EC 99 73 2E AF D2 26 F1 DA 3A 81 98 A7 17 C0 E3 ..s...&..:......
01E0: 17 49 80 49 E6 9C 07 02 03 01 00 01 A3 21 30 1F .I.I.........!0.
01F0: 30 1D 06 03 55 1D 0E 04 16 04 14 EB EF 2D 92 BB 0...U........-..
0200: 2D 5D 07 B0 FD 37 11 32 D9 3B 63 B2 7C 73 D4 30 -]...7.2.;c..s.0
0210: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H..........
0220: 81 00 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 ....t!3........p
0230: 03 4C BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 .L..B...T..Q.X..
0240: CF C7 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A ...C..uW....;...
0250: AD 26 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 .&.h.....0...+..
0260: 36 5A 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 6Z)k-..6P...&0.]
0270: 27 44 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 'D4.dYH......m..
0280: 30 81 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 0.Hm#..8N.....M.
0290: 20 05 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 .VCK...B.. ...f
02A0: 45 61 Ea
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[write] MD5 and SHA1 hashes: len = 134
0000: 10 00 00 82 00 80 24 B3 DE ED 0B E1 C2 65 B4 94 ......$......e..
0010: 41 5C A4 99 B8 FE 1A 41 44 52 6E 4B B0 70 DA 0A A\.....ADRnK.p..
0020: A4 F9 2A F5 59 F2 BF 15 3B AF 71 A8 B1 54 4A A6 ..*.Y...;.q..TJ.
0030: AD 11 95 CC 94 FA DE 5E 5D 49 44 0C 9F 79 46 5F .......^]ID..yF_
0040: 6E C3 86 4F 60 4C 1C AA A3 CF BA 00 41 58 54 96 n..O`L......AXT.
0050: C1 B0 6B E8 81 46 E3 24 5D 63 6D 11 02 64 02 C7 ..k..F.$]cm..d..
0060: 73 CE BA 65 E9 AB EE 21 02 5D D0 F0 FE 95 92 93 s..e...!.]......
0070: EF 6B 77 10 05 3E 2A 01 2A FD 68 71 65 A4 C3 BB .kw..>*.*.hqe...
0080: BA BC B1 30 F0 41 ...0.A
main, WRITE: TLSv1 Handshake, length = 134
[Raw write]: length = 139
0000: 16 03 01 00 86 10 00 00 82 00 80 24 B3 DE ED 0B ...........$....
0010: E1 C2 65 B4 94 41 5C A4 99 B8 FE 1A 41 44 52 6E ..e..A\.....ADRn
0020: 4B B0 70 DA 0A A4 F9 2A F5 59 F2 BF 15 3B AF 71 K.p....*.Y...;.q
0030: A8 B1 54 4A A6 AD 11 95 CC 94 FA DE 5E 5D 49 44 ..TJ........^]ID
0040: 0C 9F 79 46 5F 6E C3 86 4F 60 4C 1C AA A3 CF BA ..yF_n..O`L.....
0050: 00 41 58 54 96 C1 B0 6B E8 81 46 E3 24 5D 63 6D .AXT...k..F.$]cm
0060: 11 02 64 02 C7 73 CE BA 65 E9 AB EE 21 02 5D D0 ..d..s..e...!.].
0070: F0 FE 95 92 93 EF 6B 77 10 05 3E 2A 01 2A FD 68 ......kw..>*.*.h
0080: 71 65 A4 C3 BB BA BC B1 30 F0 41 qe......0.A
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 32 EC 93 C1 98 22 6B 4B 9D A6 C7 9F 98 B4 ..2...."kK......
0010: 1E F5 C8 6B CD 8F 02 D3 D2 B8 F8 A6 EB 6D 56 3C ...k.........mV<
0020: 47 A6 DF FE 4C C9 43 EA 73 BB 07 B8 97 42 03 78 G...L.C.s....B.x
CONNECTION KEYGEN:
Client Nonce:
0000: 4C 77 E2 FA E8 B1 67 09 2D CD 1E 31 D5 C1 41 3F Lw....g.-..1..A?
0010: ED B2 CB 7E E3 6B C5 00 C3 5F CE 6C F0 94 89 31 .....k..._.l...1
Server Nonce:
0000: 4C 77 E2 FA 23 E5 1B 76 1F 3C 53 5D 68 44 70 DD Lw..#..v.<S]hDp.
0010: EC 6E 71 19 DB 1B 29 13 CF 31 6E 70 C2 87 A7 D9 .nq...)..1np....
Master Secret:
0000: 3E B2 8D DE 3D 9C F3 41 E9 B7 78 AB B3 FE BB 7E >...=..A..x.....
0010: 95 76 14 D0 41 97 7C D4 A8 F5 C4 E9 F0 77 5D AD .v..A........w].
0020: BD 86 BD 97 8B 04 96 04 7B 6B B2 12 58 79 94 C0 .........k..Xy..
Client MAC write Secret:
0000: BD 96 83 B4 E2 A4 90 08 52 9F F5 35 83 C5 0D C6 ........R..5....
Server MAC write Secret:
0000: DF 19 DA 87 E3 82 5D 6E 0C 31 D2 3B BE 19 91 59 ......]n.1.;...Y
Client write key:
0000: 87 43 3C DB E3 05 18 B5 B5 E2 DC 0C FE 3C 2C 43 .C<..........<,C
Server write key:
0000: C6 5A 9B AA 06 CB E9 56 DE 7D 46 C1 E0 B1 75 1D .Z.....V..F...u.
... no IV used for this cipher
main, WRITE: TLSv1 Change Cipher Spec, length = 1
[Raw write]: length = 6
0000: 14 03 01 00 01 01 ......
*** Finished
verify_data: { 16, 60, 17, 155, 46, 171, 79, 33, 118, 235, 43, 39 }
***
[write] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 10 3C 11 9B 2E AB 4F 21 76 EB 2B 27 .....<....O!v.+'
Padded plaintext before ENCRYPTION: len = 32
0000: 14 00 00 0C 10 3C 11 9B 2E AB 4F 21 76 EB 2B 27 .....<....O!v.+'
0010: 88 E5 2E 9C C1 41 4A C6 2E 57 1B 57 5C D3 36 B0 .....AJ..W.W\.6.
main, WRITE: TLSv1 Handshake, length = 32
[Raw write]: length = 37
0000: 16 03 01 00 20 9E 62 CA 2C 6E 06 2C 58 2B 53 B8 .... .b.,n.,X+S.
0010: 21 7E F6 E8 8C 65 F2 D5 8A 69 0C 05 F9 8D FD F9 !....e...i......
0020: B4 12 9F A3 33 ....3
[Raw read]: length = 5
0000: 14 03 01 00 01 .....
[Raw read]: length = 1
0000: 01 .
main, READ: TLSv1 Change Cipher Spec, length = 1
[Raw read]: length = 5
0000: 16 03 01 00 20 ....
[Raw read]: length = 32
0000: B6 E9 E1 43 19 5A D9 4F DF AB 54 4C 28 52 66 C0 ...C.Z.O..TL(Rf.
0010: 8A E7 BF 0D 00 69 DE 35 15 11 07 37 37 4D 63 88 .....i.5...77Mc.
main, READ: TLSv1 Handshake, length = 32
Padded plaintext after DECRYPTION: len = 32
0000: 14 00 00 0C C0 85 2C 0C F5 47 BA 00 31 3C 81 94 ......,..G..1<..
0010: F7 47 C5 10 AA 16 D1 C0 C4 06 70 C3 24 B7 82 A4 .G........p.$...
*** Finished
verify_data: { 192, 133, 44, 12, 245, 71, 186, 0, 49, 60, 129, 148 }
***
%% Cached client session: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
[read] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C C0 85 2C 0C F5 47 BA 00 31 3C 81 94 ......,..G..1<..
Padded plaintext before ENCRYPTION: len = 215
0000: 47 45 54 20 2F 47 72 65 65 74 69 6E 67 53 65 72 GET /GreetingSer
0010: 76 6C 65 74 4D 75 74 75 61 6C 2F 48 65 6C 6C 6F vletMutual/Hello
0020: 57 6F 72 6C 64 57 53 53 65 72 76 69 63 65 3F 77 WorldWSService?w
0030: 73 64 6C 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 sdl HTTP/1.1..Us
0040: 65 72 2D 41 67 65 6E 74 3A 20 4A 61 76 61 2F 31 er-Agent: Java/1
0050: 2E 36 2E 30 5F 31 39 0D 0A 48 6F 73 74 3A 20 6C .6.0_19..Host: l
0060: 6F 63 61 6C 68 6F 73 74 3A 38 31 38 31 0D 0A 41 ocalhost:8181..A
0070: 63 63 65 70 74 3A 20 74 65 78 74 2F 68 74 6D 6C ccept: text/html
0080: 2C 20 69 6D 61 67 65 2F 67 69 66 2C 20 69 6D 61 , image/gif, ima
0090: 67 65 2F 6A 70 65 67 2C 20 2A 3B 20 71 3D 2E 32 ge/jpeg, *; q=.2
00A0: 2C 20 2A 2F 2A 3B 20 71 3D 2E 32 0D 0A 43 6F 6E , */*; q=.2..Con
00B0: 6E 65 63 74 69 6F 6E 3A 20 6B 65 65 70 2D 61 6C nection: keep-al
00C0: 69 76 65 0D 0A 0D 0A 69 18 0B 7A B8 04 1A D9 8D ive....i..z.....
00D0: EE E1 51 5B 2E B9 7A ..Q[..z
main, WRITE: TLSv1 Application Data, length = 215
[Raw write]: length = 220
0000: 17 03 01 00 D7 45 2E B5 C0 13 FB BF F8 A5 24 A3 .....E........$.
0010: E2 C4 F1 12 BD 9F 13 53 B1 65 53 B9 6F 0A 35 1B .......S.eS.o.5.
0020: 7E 0A 6B 57 0C 11 4C 41 00 E7 10 FA 35 C8 77 EC ..kW..LA....5.w.
0030: D0 4C E7 03 7D AB 04 F5 CD 5D F8 0E F3 37 A3 4C .L.......]...7.L
0040: 41 06 E8 1C E5 7B 3E 2D C8 01 8A 77 76 4B 30 03 A.....>-...wvK0.
0050: 3F B5 C9 57 88 7B D0 ED D3 4C C4 33 69 6E 55 4F ?..W.....L.3inUO
0060: 35 C0 12 6E 95 9E 17 CA 91 A8 35 AF 4C 84 AE 62 5..n......5.L..b
0070: E0 B6 87 C2 3F AD 98 F0 AB F3 F9 8D E1 4E DC 19 ....?........N..
0080: 6C D3 F7 8A 55 B9 FD 07 9E 4B B7 B9 D5 C1 D5 8F l...U....K......
0090: AD A7 69 74 8F 00 86 0D E9 6E 31 8A 8C 57 BE D3 ..it.....n1..W..
00A0: 0B AE 54 FC CD B1 1D 19 65 B0 52 EC 5A 34 3D F8 ..T.....e.R.Z4=.
00B0: 2F DC B7 B3 69 AF FE 8D FF 8B 20 01 00 04 12 E1 /...i..... .....
00C0: 03 2C 35 77 B8 9D 5F 95 16 95 0F 36 6B 28 CA F7 .,5w.._....6k(..
00D0: 2B A8 AA 61 9D E4 59 7E 5A 02 30 10 +..a..Y.Z.0.
main, received EOFException: ignored
main, called closeInternal(false)
main, SEND TLSv1 ALERT: warning, description = close_notify
Padded plaintext before ENCRYPTION: len = 18
0000: 01 00 95 FB 36 24 84 9A ED 6B A3 53 ED 28 2D CA ....6$...k.S.(-.
0010: 9C FE ..
main, WRITE: TLSv1 Alert, length = 18
[Raw write]: length = 23
0000: 15 03 01 00 12 63 B5 6C 3F 8A E7 4A 65 85 EE 01 .....c.l?..Je...
0010: 5B E1 03 BF FF 37 55 [....7U
main, called close()
main, called closeInternal(true)
%% Client cached [Session-1, SSL_RSA_WITH_RC4_128_MD5]
%% Try resuming [Session-1, SSL_RSA_WITH_RC4_128_MD5] from port 49667
*** ClientHello, TLSv1
RandomCookie: GMT: 1282859515 bytes = { 137, 104, 128, 224, 132, 208, 184, 92, 195, 119, 27, 154, 65, 66, 67, 28, 169, 83, 52, 61, 4, 238, 37, 107, 135, 49, 93, 233 }
Session ID: {76, 119, 226, 250, 157, 63, 156, 188, 135, 138, 250, 251, 150, 247, 218, 45, 97, 217, 113, 224, 98, 225, 226, 43, 204, 70, 156, 184, 21, 136, 239, 65}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 105
0000: 01 00 00 65 03 01 4C 77 E2 FB 89 68 80 E0 84 D0 ...e..Lw...h....
0010: B8 5C C3 77 1B 9A 41 42 43 1C A9 53 34 3D 04 EE .\.w..ABC..S4=..
0020: 25 6B 87 31 5D E9 20 4C 77 E2 FA 9D 3F 9C BC 87 %k.1]. Lw...?...
0030: 8A FA FB 96 F7 DA 2D 61 D9 71 E0 62 E1 E2 2B CC ......-a.q.b..+.
0040: 46 9C B8 15 88 EF 41 00 1E 00 04 00 05 00 2F 00 F.....A......./.
0050: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0060: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 105
[Raw write]: length = 110
0000: 16 03 01 00 69 01 00 00 65 03 01 4C 77 E2 FB 89 ....i...e..Lw...
0010: 68 80 E0 84 D0 B8 5C C3 77 1B 9A 41 42 43 1C A9 h.....\.w..ABC..
0020: 53 34 3D 04 EE 25 6B 87 31 5D E9 20 4C 77 E2 FA S4=..%k.1]. Lw..
0030: 9D 3F 9C BC 87 8A FA FB 96 F7 DA 2D 61 D9 71 E0 .?.........-a.q.
0040: 62 E1 E2 2B CC 46 9C B8 15 88 EF 41 00 1E 00 04 b..+.F.....A....
0050: 00 05 00 2F 00 33 00 32 00 0A 00 16 00 13 00 09 .../.3.2........
0060: 00 15 00 12 00 03 00 08 00 14 00 11 01 00 ..............
[Raw read]: length = 5
0000: 16 03 01 02 F0 .....
[Raw read]: length = 752
0000: 02 00 00 46 03 01 4C 77 E2 FB B1 FC 24 78 6B 18 ...F..Lw....$xk.
0010: E3 68 07 EB F9 13 E7 54 E9 98 49 2B F4 17 D8 69 .h.....T..I+...i
0020: 6E 8D 8D B7 78 8C 20 4C 77 E2 FB 24 44 22 70 E9 n...x. Lw..$D"p.
0030: 96 26 09 93 4A AD 43 75 18 BC 4C 65 3A A5 AC 8C .&..J.Cu..Le:...
0040: ED B7 9B 45 21 6F B2 00 04 00 0B 00 02 9E 00 02 ...E!o..........
0050: 9B 00 02 98 30 82 02 94 30 82 01 FD A0 03 02 01 ....0...0.......
0060: 02 02 04 4C 0E D7 B3 30 0D 06 09 2A 86 48 86 F7 ...L...0...*.H..
0070: 0D 01 01 05 05 00 30 7D 31 0B 30 09 06 03 55 04 ......0.1.0...U.
0080: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U....
0090: 43 61 6C 69 66 6F 72 6E 69 61 31 14 30 12 06 03 California1.0...
00A0: 55 04 07 13 0B 53 61 6E 74 61 20 43 6C 61 72 61 U....Santa Clara
00B0: 31 1B 30 19 06 03 55 04 0A 13 12 4F 72 61 63 6C 1.0...U....Oracl
00C0: 65 20 43 6F 72 70 6F 72 61 74 69 6F 6E 31 12 30 e Corporation1.0
00D0: 10 06 03 55 04 0B 13 09 47 6C 61 73 73 46 69 73 ...U....GlassFis
00E0: 68 31 12 30 10 06 03 55 04 03 13 09 6C 6F 63 61 h1.0...U....loca
00F0: 6C 68 6F 73 74 30 1E 17 0D 31 30 30 36 30 38 32 lhost0...1006082
0100: 33 35 32 31 39 5A 17 0D 32 30 30 36 30 35 32 33 35219Z..20060523
0110: 35 32 31 39 5A 30 7D 31 0B 30 09 06 03 55 04 06 5219Z0.1.0...U..
0120: 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 ..US1.0...U....C
0130: 61 6C 69 66 6F 72 6E 69 61 31 14 30 12 06 03 55 alifornia1.0...U
0140: 04 07 13 0B 53 61 6E 74 61 20 43 6C 61 72 61 31 ....Santa Clara1
0150: 1B 30 19 06 03 55 04 0A 13 12 4F 72 61 63 6C 65 .0...U....Oracle
0160: 20 43 6F 72 70 6F 72 61 74 69 6F 6E 31 12 30 10 Corporation1.0.
0170: 06 03 55 04 0B 13 09 47 6C 61 73 73 46 69 73 68 ..U....GlassFish
0180: 31 12 30 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 1.0...U....local
0190: 68 6F 73 74 30 81 9F 30 0D 06 09 2A 86 48 86 F7 host0..0...*.H..
01A0: 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 ..........0.....
01B0: 00 93 5B 1D 8C A9 C9 0D 4C 8C 06 6D BB 03 AC 3B ..[.....L..m...;
01C0: 5D BC 42 B7 C3 C8 24 8E F7 BF E3 89 FF B8 71 7A ].B...$.......qz
01D0: EE 2D 42 30 FA BA A8 6E 63 4C 60 DB 18 ED 37 3A .-B0...ncL`...7:
01E0: 27 66 9A 56 7A 6E FC 6F 7A E9 E7 17 2F AC D4 5E 'f.Vzn.oz.../..^
01F0: C7 D9 69 AA F4 12 B8 3C A6 E5 DF 36 BE 75 27 7D ..i....<...6.u'.
0200: 85 AF 47 7E F2 28 E0 B0 37 39 68 AC B2 9E 79 67 ..G..(..79h...yg
0210: FD 92 E4 3F 8D ED 0B 2F 89 40 EC 99 73 2E AF D2 ...?.../.@..s...
0220: 26 F1 DA 3A 81 98 A7 17 C0 E3 17 49 80 49 E6 9C &..:.......I.I..
0230: 07 02 03 01 00 01 A3 21 30 1F 30 1D 06 03 55 1D .......!0.0...U.
0240: 0E 04 16 04 14 EB EF 2D 92 BB 2D 5D 07 B0 FD 37 .......-..-]...7
0250: 11 32 D9 3B 63 B2 7C 73 D4 30 0D 06 09 2A 86 48 .2.;c..s.0...*.H
0260: 86 F7 0D 01 01 05 05 00 03 81 81 00 16 7D 74 21 ..............t!
0270: 33 BE 16 84 90 C6 A0 8A E8 70 03 4C BA B0 42 8C 3........p.L..B.
0280: FD FA 54 12 D0 51 92 58 F7 80 CF C7 93 43 BA DB ..T..Q.X.....C..
0290: 75 57 9F 03 ED E1 3B E9 00 0A AD 26 90 68 C2 B3 uW....;....&.h..
02A0: 10 C9 B3 30 09 CD A7 2B E1 03 36 5A 29 6B 2D 12 ...0...+..6Z)k-.
02B0: 9B 36 50 0F 9E DE 26 30 19 5D 27 44 34 CB 64 59 .6P...&0.]'D4.dY
02C0: 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 48 6D 23 0D H......m..0.Hm#.
02D0: F9 38 4E EB 03 FF AC DE 4D F3 20 05 56 43 4B E8 .8N.....M. .VCK.
02E0: CC 83 42 00 7F 20 DF 7F 86 66 45 61 0E 00 00 00 ..B.. ...fEa....
main, READ: TLSv1 Handshake, length = 752
*** ServerHello, TLSv1
RandomCookie: GMT: 1282859515 bytes = { 177, 252, 36, 120, 107, 24, 227, 104, 7, 235, 249, 19, 231, 84, 233, 152, 73, 43, 244, 23, 216, 105, 110, 141, 141, 183, 120, 140 }
Session ID: {76, 119, 226, 251, 36, 68, 34, 112, 233, 150, 38, 9, 147, 74, 173, 67, 117, 24, 188, 76, 101, 58, 165, 172, 140, 237, 183, 155, 69, 33, 111, 178}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
%% Created: [Session-2, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
[read] MD5 and SHA1 hashes: len = 74
0000: 02 00 00 46 03 01 4C 77 E2 FB B1 FC 24 78 6B 18 ...F..Lw....$xk.
0010: E3 68 07 EB F9 13 E7 54 E9 98 49 2B F4 17 D8 69 .h.....T..I+...i
0020: 6E 8D 8D B7 78 8C 20 4C 77 E2 FB 24 44 22 70 E9 n...x. Lw..$D"p.
0030: 96 26 09 93 4A AD 43 75 18 BC 4C 65 3A A5 AC 8C .&..J.Cu..Le:...
0040: ED B7 9B 45 21 6F B2 00 04 00 ...E!o....
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus: 103476845748620715542290158352552555093264732266451674754844075400351516698831428551155347844995838551626340282893429600444363416063149937375329202383853147577890011014834771591190580506467978926663872132742910637975131558926563105340719768686380076500399618522663192552278442404435084378459058183339543796743
public exponent: 65537
Validity: [From: Tue Jun 08 18:52:19 CDT 2010,
To: Fri Jun 05 18:52:19 CDT 2020]
Issuer: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
SerialNumber: [ 4c0ed7b3]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: EB EF 2D 92 BB 2D 5D 07 B0 FD 37 11 32 D9 3B 63 ..-..-]...7.2.;c
0010: B2 7C 73 D4 ..s.
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 03 4C ..t!3........p.L
0010: BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 CF C7 ..B...T..Q.X....
0020: 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A AD 26 .C..uW....;....&
0030: 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 36 5A .h.....0...+..6Z
0040: 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 27 44 )k-..6P...&0.]'D
0050: 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 4.dYH......m..0.
0060: 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 20 05 Hm#..8N.....M. .
0070: 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 45 61 VCK...B.. ...fEa

]
***
Found trusted certificate:
[
[
Version: V3
Subject: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: Sun RSA public key, 1024 bits
modulus: 103476845748620715542290158352552555093264732266451674754844075400351516698831428551155347844995838551626340282893429600444363416063149937375329202383853147577890011014834771591190580506467978926663872132742910637975131558926563105340719768686380076500399618522663192552278442404435084378459058183339543796743
public exponent: 65537
Validity: [From: Tue Jun 08 18:52:19 CDT 2010,
To: Fri Jun 05 18:52:19 CDT 2020]
Issuer: CN=localhost, OU=GlassFish, O=Oracle Corporation, L=Santa Clara, ST=California, C=US
SerialNumber: [ 4c0ed7b3]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: EB EF 2D 92 BB 2D 5D 07 B0 FD 37 11 32 D9 3B 63 ..-..-]...7.2.;c
0010: B2 7C 73 D4 ..s.
]
]

]
Algorithm: [SHA1withRSA]
Signature:
0000: 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 03 4C ..t!3........p.L
0010: BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 CF C7 ..B...T..Q.X....
0020: 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A AD 26 .C..uW....;....&
0030: 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 36 5A .h.....0...+..6Z
0040: 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 27 44 )k-..6P...&0.]'D
0050: 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 30 81 4.dYH......m..0.
0060: 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 20 05 Hm#..8N.....M. .
0070: 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 45 61 VCK...B.. ...fEa

]
[read] MD5 and SHA1 hashes: len = 674
0000: 0B 00 02 9E 00 02 9B 00 02 98 30 82 02 94 30 82 ..........0...0.
0010: 01 FD A0 03 02 01 02 02 04 4C 0E D7 B3 30 0D 06 .........L...0..
0020: 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 7D 31 0B .*.H........0.1.
0030: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0..
0040: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California
0050: 31 14 30 12 06 03 55 04 07 13 0B 53 61 6E 74 61 1.0...U....Santa
0060: 20 43 6C 61 72 61 31 1B 30 19 06 03 55 04 0A 13 Clara1.0...U...
0070: 12 4F 72 61 63 6C 65 20 43 6F 72 70 6F 72 61 74 .Oracle Corporat
0080: 69 6F 6E 31 12 30 10 06 03 55 04 0B 13 09 47 6C ion1.0...U....Gl
0090: 61 73 73 46 69 73 68 31 12 30 10 06 03 55 04 03 assFish1.0...U..
00A0: 13 09 6C 6F 63 61 6C 68 6F 73 74 30 1E 17 0D 31 ..localhost0...1
00B0: 30 30 36 30 38 32 33 35 32 31 39 5A 17 0D 32 30 00608235219Z..20
00C0: 30 36 30 35 32 33 35 32 31 39 5A 30 7D 31 0B 30 0605235219Z0.1.0
00D0: 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 ...U....US1.0...
00E0: 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 U....California1
00F0: 14 30 12 06 03 55 04 07 13 0B 53 61 6E 74 61 20 .0...U....Santa
0100: 43 6C 61 72 61 31 1B 30 19 06 03 55 04 0A 13 12 Clara1.0...U....
0110: 4F 72 61 63 6C 65 20 43 6F 72 70 6F 72 61 74 69 Oracle Corporati
0120: 6F 6E 31 12 30 10 06 03 55 04 0B 13 09 47 6C 61 on1.0...U....Gla
0130: 73 73 46 69 73 68 31 12 30 10 06 03 55 04 03 13 ssFish1.0...U...
0140: 09 6C 6F 63 61 6C 68 6F 73 74 30 81 9F 30 0D 06 .localhost0..0..
0150: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
0160: 30 81 89 02 81 81 00 93 5B 1D 8C A9 C9 0D 4C 8C 0.......[.....L.
0170: 06 6D BB 03 AC 3B 5D BC 42 B7 C3 C8 24 8E F7 BF .m...;].B...$...
0180: E3 89 FF B8 71 7A EE 2D 42 30 FA BA A8 6E 63 4C ....qz.-B0...ncL
0190: 60 DB 18 ED 37 3A 27 66 9A 56 7A 6E FC 6F 7A E9 `...7:'f.Vzn.oz.
01A0: E7 17 2F AC D4 5E C7 D9 69 AA F4 12 B8 3C A6 E5 ../..^..i....<..
01B0: DF 36 BE 75 27 7D 85 AF 47 7E F2 28 E0 B0 37 39 .6.u'...G..(..79
01C0: 68 AC B2 9E 79 67 FD 92 E4 3F 8D ED 0B 2F 89 40 h...yg...?.../.@
01D0: EC 99 73 2E AF D2 26 F1 DA 3A 81 98 A7 17 C0 E3 ..s...&..:......
01E0: 17 49 80 49 E6 9C 07 02 03 01 00 01 A3 21 30 1F .I.I.........!0.
01F0: 30 1D 06 03 55 1D 0E 04 16 04 14 EB EF 2D 92 BB 0...U........-..
0200: 2D 5D 07 B0 FD 37 11 32 D9 3B 63 B2 7C 73 D4 30 -]...7.2.;c..s.0
0210: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H..........
0220: 81 00 16 7D 74 21 33 BE 16 84 90 C6 A0 8A E8 70 ....t!3........p
0230: 03 4C BA B0 42 8C FD FA 54 12 D0 51 92 58 F7 80 .L..B...T..Q.X..
0240: CF C7 93 43 BA DB 75 57 9F 03 ED E1 3B E9 00 0A ...C..uW....;...
0250: AD 26 90 68 C2 B3 10 C9 B3 30 09 CD A7 2B E1 03 .&.h.....0...+..
0260: 36 5A 29 6B 2D 12 9B 36 50 0F 9E DE 26 30 19 5D 6Z)k-..6P...&0.]
0270: 27 44 34 CB 64 59 48 8E A8 1A 9F E2 B8 6D 7C F6 'D4.dYH......m..
0280: 30 81 48 6D 23 0D F9 38 4E EB 03 FF AC DE 4D F3 0.Hm#..8N.....M.
0290: 20 05 56 43 4B E8 CC 83 42 00 7F 20 DF 7F 86 66 .VCK...B.. ...f
02A0: 45 61 Ea
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[write] MD5 and SHA1 hashes: len = 134
0000: 10 00 00 82 00 80 5A 0E BE AF B3 4A C2 04 93 4F ......Z....J...O
0010: DE BE 70 05 3C 27 E2 61 13 51 79 B5 AE 2C 26 23 ..p.<'.a.Qy..,&#
0020: E2 19 8C C5 25 84 38 47 3F 7C B0 64 68 75 CB 0E ....%.8G?..dhu..
0030: 28 25 A9 4C 86 48 D8 CC 76 CF 55 CB DF DC DA 89 (%.L.H..v.U.....
0040: 18 B2 4E 84 33 7A 4C 1D 38 80 BF 91 51 F0 D6 8E ..N.3zL.8...Q...
0050: F7 64 32 98 7E AE 7D 08 3F BC B5 E2 80 9F 47 C7 .d2.....?.....G.
0060: DE AA 6B E1 70 E5 83 15 07 82 1F C8 65 73 C0 CD ..k.p.......es..
0070: F0 C8 7F 21 5F 11 98 C8 1E 26 15 8F EA 8B B3 EA ...!_....&......
0080: 70 E8 1B 00 AE FF p.....
main, WRITE: TLSv1 Handshake, length = 134
[Raw write]: length = 139
0000: 16 03 01 00 86 10 00 00 82 00 80 5A 0E BE AF B3 ...........Z....
0010: 4A C2 04 93 4F DE BE 70 05 3C 27 E2 61 13 51 79 J...O..p.<'.a.Qy
0020: B5 AE 2C 26 23 E2 19 8C C5 25 84 38 47 3F 7C B0 ..,&#....%.8G?..
0030: 64 68 75 CB 0E 28 25 A9 4C 86 48 D8 CC 76 CF 55 dhu..(%.L.H..v.U
0040: CB DF DC DA 89 18 B2 4E 84 33 7A 4C 1D 38 80 BF .......N.3zL.8..
0050: 91 51 F0 D6 8E F7 64 32 98 7E AE 7D 08 3F BC B5 .Q....d2.....?..
0060: E2 80 9F 47 C7 DE AA 6B E1 70 E5 83 15 07 82 1F ...G...k.p......
0070: C8 65 73 C0 CD F0 C8 7F 21 5F 11 98 C8 1E 26 15 .es.....!_....&.
0080: 8F EA 8B B3 EA 70 E8 1B 00 AE FF .....p.....
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 5B 9E 8E A5 A2 73 EE 3D B8 13 FB 15 A6 77 ..[....s.=.....w
0010: BA 86 E5 22 51 6C 90 11 83 94 D8 40 B1 12 AD 58 ..."Ql.....@...X
0020: D4 84 79 53 48 86 20 D6 13 AE 1F 3A 90 0A D4 28 ..ySH. ....:...(
CONNECTION KEYGEN:
Client Nonce:
0000: 4C 77 E2 FB 89 68 80 E0 84 D0 B8 5C C3 77 1B 9A Lw...h.....\.w..
0010: 41 42 43 1C A9 53 34 3D 04 EE 25 6B 87 31 5D E9 ABC..S4=..%k.1].
Server Nonce:
0000: 4C 77 E2 FB B1 FC 24 78 6B 18 E3 68 07 EB F9 13 Lw....$xk..h....
0010: E7 54 E9 98 49 2B F4 17 D8 69 6E 8D 8D B7 78 8C .T..I+...in...x.
Master Secret:
0000: 17 97 0F AC 03 AC 25 59 88 68 1F 22 51 56 D9 15 ......%Y.h."QV..
0010: EA 4A E5 9C 2F C9 0A D7 BE C2 70 25 3D DD C2 D4 .J../.....p%=...
0020: 38 ED BD 33 3A 12 56 CE EC CF F3 3F 14 22 83 EE 8..3:.V....?."..
Client MAC write Secret:
0000: E2 EC 3A 34 1C E5 41 35 89 CA A9 AE 35 B7 A5 93 ..:4..A5....5...
Server MAC write Secret:
0000: 2F 21 17 C3 F0 43 E8 ED DE 04 E6 EF 42 3A 50 AA /!...C......B:P.
Client write key:
0000: 2B 35 DB F3 1E C9 64 8B FC 56 72 EF 04 6D 40 9E +5....d..Vr..m@.
Server write key:
0000: D9 45 6D 7B 2A 53 5C 9A E6 ED F1 4F 7D D6 78 1A .Em.*S\....O..x.
... no IV used for this cipher
main, WRITE: TLSv1 Change Cipher Spec, length = 1
[Raw write]: length = 6
0000: 14 03 01 00 01 01 ......
*** Finished
verify_data: { 13, 130, 169, 41, 45, 189, 113, 72, 60, 83, 118, 102 }
***
[write] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 0D 82 A9 29 2D BD 71 48 3C 53 76 66 .......)-.qH<Svf
Padded plaintext before ENCRYPTION: len = 32
0000: 14 00 00 0C 0D 82 A9 29 2D BD 71 48 3C 53 76 66 .......)-.qH<Svf
0010: CA 17 2E E8 50 32 75 04 1C 6C 67 0F BD AD 8C A2 ....P2u..lg.....
main, WRITE: TLSv1 Handshake, length = 32
[Raw write]: length = 37
0000: 16 03 01 00 20 A3 7A 76 1A 34 6D 36 4B C2 B5 95 .... .zv.4m6K...
0010: AE DC F9 F0 41 9E 78 DE CF 6D 8A 57 B9 43 ED B9 ....A.x..m.W.C..
0020: 31 04 45 F2 A1 1.E..
[Raw read]: length = 5
0000: 14 03 01 00 01 .....
[Raw read]: length = 1
0000: 01 .
main, READ: TLSv1 Change Cipher Spec, length = 1
[Raw read]: length = 5
0000: 16 03 01 00 20 ....
[Raw read]: length = 32
0000: E1 0B 2D 1E 41 F1 52 2E 52 D2 D1 CE 97 87 C5 8A ..-.A.R.R.......
0010: F6 D6 6E D6 E8 96 D1 0A 0D 28 BC DD 04 12 D6 01 ..n......(......
main, READ: TLSv1 Handshake, length = 32
Padded plaintext after DECRYPTION: len = 32
0000: 14 00 00 0C 0F 87 8D 45 1F 6A EC 7F A2 27 F9 81 .......E.j...'..
0010: DC 42 03 78 DB 4B CE 9D 0D 8C 35 DE 84 79 88 EA .B.x.K....5..y..
*** Finished
verify_data: { 15, 135, 141, 69, 31, 106, 236, 127, 162, 39, 249, 129 }
***
%% Cached client session: [Session-2, SSL_RSA_WITH_RC4_128_MD5]
[read] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 0F 87 8D 45 1F 6A EC 7F A2 27 F9 81 .......E.j...'..
Padded plaintext before ENCRYPTION: len = 215
0000: 47 45 54 20 2F 47 72 65 65 74 69 6E 67 53 65 72 GET /GreetingSer
0010: 76 6C 65 74 4D 75 74 75 61 6C 2F 48 65 6C 6C 6F vletMutual/Hello
0020: 57 6F 72 6C 64 57 53 53 65 72 76 69 63 65 3F 77 WorldWSService?w
0030: 73 64 6C 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 sdl HTTP/1.1..Us
0040: 65 72 2D 41 67 65 6E 74 3A 20 4A 61 76 61 2F 31 er-Agent: Java/1
0050: 2E 36 2E 30 5F 31 39 0D 0A 48 6F 73 74 3A 20 6C .6.0_19..Host: l
0060: 6F 63 61 6C 68 6F 73 74 3A 38 31 38 31 0D 0A 41 ocalhost:8181..A
0070: 63 63 65 70 74 3A 20 74 65 78 74 2F 68 74 6D 6C ccept: text/html
0080: 2C 20 69 6D 61 67 65 2F 67 69 66 2C 20 69 6D 61 , image/gif, ima
0090: 67 65 2F 6A 70 65 67 2C 20 2A 3B 20 71 3D 2E 32 ge/jpeg, *; q=.2
00A0: 2C 20 2A 2F 2A 3B 20 71 3D 2E 32 0D 0A 43 6F 6E , */*; q=.2..Con
00B0: 6E 65 63 74 69 6F 6E 3A 20 6B 65 65 70 2D 61 6C nection: keep-al
00C0: 69 76 65 0D 0A 0D 0A 65 37 DE 62 1D E1 5B F2 EF ive....e7.b..[..
00D0: 91 40 76 DC 42 64 19 .@v.Bd.
main, WRITE: TLSv1 Application Data, length = 215
[Raw write]: length = 220
0000: 17 03 01 00 D7 0A 4B 24 AE 85 33 E4 F8 21 D9 92 ......K$..3..!..
0010: 56 61 55 06 61 39 FA 95 A8 B0 18 71 07 46 5D 7B VaU.a9.....q.F].
0020: E8 25 47 9C FF 7A 1B AC D3 88 7D E1 29 D1 7A EF .%G..z......).z.
0030: E4 9D F6 B3 28 AD 4C DD 5E 9B 49 27 2F 73 B0 CD ....(.L.^.I'/s..
0040: C6 64 D1 8C 2D 6B 97 C2 C8 C4 64 FF B2 35 D3 D6 .d..-k....d..5..
0050: D7 AC A4 41 29 31 B4 5D 53 8F D5 FE C1 74 04 1A ...A)1.]S....t..
0060: 05 31 31 82 85 4A 9E 55 A0 70 DC 87 29 53 B1 97 .11..J.U.p..)S..
0070: 13 28 50 68 B7 F4 81 BE C6 7D 11 A8 D2 0A D0 FD .(Ph............
0080: E2 22 65 62 2F FA 0F 34 5E 0B 61 68 D1 30 1E 4F ."eb/..4^.ah.0.O
0090: 26 0F 52 4D BB 9C 61 77 0C E5 8B 8E F2 6E 94 B2 &.RM..aw.....n..
00A0: 02 1D EB D2 0B A3 3B 44 37 AE 8E C6 CF B2 F9 B9 ......;D7.......
00B0: EF 8E 47 22 3B 46 1B 2A 16 FB 87 0D 90 E9 90 18 ..G";F.*........
00C0: B3 EC 75 46 4F E5 15 0B 2C 80 3A A6 F5 A2 25 59 ..uFO...,.:...%Y
00D0: 45 1A BF A3 3D 79 27 79 F2 06 56 E1 E...=y'y..V.
main, received EOFException: ignored
main, called closeInternal(false)
main, SEND TLSv1 ALERT: warning, description = close_notify
Padded plaintext before ENCRYPTION: len = 18
0000: 01 00 F9 E4 95 7D 1C 4B B7 BA DB E3 44 C2 95 28 .......K....D..(
0010: 39 39 99
main, WRITE: TLSv1 Alert, length = 18
[Raw write]: length = 23
0000: 15 03 01 00 12 54 9E 93 38 00 59 55 7E B8 AE 97 .....T..8.YU....
0010: 18 22 9B 2B BE 3C CC .".+.<.
main, called close()
main, called closeInternal(true)
main, called close()
main, called closeInternal(true)
Exception in thread "main" javax.xml.ws.WebServiceException: Failed to access the WSDL at: https://localhost:8181/GreetingServletMutual/HelloWorldWSService?wsdl. It failed with:
Unexpected end of file from server.
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.tryWithMex(RuntimeWSDLParser.java:151)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:133)
at com.sun.xml.internal.ws.client.WSServiceDelegate.parseWSDL(WSServiceDelegate.java:254)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:217)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:165)
at com.sun.xml.internal.ws.spi.ProviderImpl.createServiceDelegate(ProviderImpl.java:93)
at javax.xml.ws.Service.<init>(Service.java:56)
at com.ivan.HelloWorldWSService.<init>(HelloWorldWSService.java:46)
at com.ivan.client.HelloWSClient.callService(HelloWSClient.java:59)
at com.ivan.client.HelloWSClient.main(HelloWSClient.java:55)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.intellij.rt.execution.application.AppMain.main(AppMain.java:115)
Caused by: java.net.SocketException: Unexpected end of file from server
at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:769)
at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:632)
at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:766)
at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:632)
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1072)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:234)
at java.net.URL.openStream(URL.java:1010)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.createReader(RuntimeWSDLParser.java:793)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.resolveWSDL(RuntimeWSDLParser.java:251)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:118)
... 13 more

Any help on this is appreciated.

Thanks
Hello,
I figured it out. The magic is in port number. I used HTTP port number 8080 instead of Secure HTTP port 8181 in WSDL location within generated service class. Have fun.

Regards
Hi,

I'm trying webservice security example(SSL and Mutual Authentication) from Ivan's study guide. Section 8.3 and 8.4. While running corrresponding client program I'm getting below error.

main, received EOFException: error
main, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake
main, SEND TLSv1 ALERT: fatal, description = handshake_failure
main, WRITE: TLSv1 Alert, length = 2
[Raw write]: length = 7
0000: 15 03 01 00 02 02 28 ......(
main, called closeSocket()
Exception in thread "main" javax.xml.ws.WebServiceException: Failed to access the WSDL at: https://localhost:8080/GreetingServletSSL/HelloWorldWSService?wsdl. It failed with:
Remote host closed connection during handshake.
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.tryWithMex(RuntimeWSDLParser.java:151)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:133)
at com.sun.xml.internal.ws.client.WSServiceDelegate.parseWSDL(WSServiceDelegate.java:254)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:217)
at com.sun.xml.internal.ws.client.WSServiceDelegate.<init>(WSServiceDelegate.java:165)
at com.sun.xml.internal.ws.spi.ProviderImpl.createServiceDelegate(ProviderImpl.java:93)
at javax.xml.ws.Service.<init>(Service.java:56)
at com.ivan.HelloWorldWSService.<init>(HelloWorldWSService.java:46)
at com.ivan.client.HelloWSClient.callService(HelloWSClient.java:60)
at com.ivan.client.HelloWSClient.main(HelloWSClient.java:56)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.intellij.rt.execution.application.AppMain.main(AppMain.java:115)
Caused by: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:808)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1120)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1147)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1131)
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:434)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:166)
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1049)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:234)
at java.net.URL.openStream(URL.java:1010)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.createReader(RuntimeWSDLParser.java:793)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.resolveWSDL(RuntimeWSDLParser.java:251)
at com.sun.xml.internal.ws.wsdl.parser.RuntimeWSDLParser.parse(RuntimeWSDLParser.java:118)
... 13 more
Caused by: java.io.EOFException: SSL peer shut down incorrectly
at com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:333)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:789)
... 24 more

Access control example works fine for me. Does anybody get similar error? I will appreciate if someone knows how to solve this.

Thanks