Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 09:48:55.253 [main] INFO org.apache.camel.test.AvailablePortFinder - getNextAvailable(1101) -> 1101
- 09:48:55.306 [main] DEBUG org.eclipse.jetty.util.log - Logging to org.apache.logging.slf4j.Log4jLogger@77e4c80f via org.eclipse.jetty.util.log.Slf4jLog
- 09:48:55.308 [main] INFO org.eclipse.jetty.util.log - Logging initialized @1700ms
- 09:48:55.357 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@7f9fcf7f added {qtp1658926803{STOPPED,8<=0<=200,i=0,q=0},AUTO}
- 09:48:55.417 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - HttpConnectionFactory@2c34f934{HTTP/1.1} added {HttpConfiguration@12d3a4e9{32768/8192,8192/8192,https://:0,[]},POJO}
- 09:48:55.422 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{null}{0.0.0.0:0} added {org.eclipse.jetty.server.Server@7f9fcf7f,UNMANAGED}
- 09:48:55.439 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{null}{0.0.0.0:0} added {qtp1658926803{STOPPED,8<=0<=200,i=0,q=0},AUTO}
- 09:48:55.440 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{null}{0.0.0.0:0} added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@14a2f921,AUTO}
- 09:48:55.443 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{null}{0.0.0.0:0} added {org.eclipse.jetty.io.ArrayByteBufferPool@5af97850,POJO}
- 09:48:55.459 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{null}{0.0.0.0:0} added {HttpConnectionFactory@2c34f934{HTTP/1.1},AUTO}
- 09:48:55.464 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:0} added {org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@691a7f8f,MANAGED}
- 09:48:55.465 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@7f9fcf7f added {ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101},AUTO}
- 09:48:55.466 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - HttpConnectionFactory@50a7bc6e{HTTP/1.1} added {HttpConfiguration@161b062a{32768/8192,8192/8192,https://:0,[]},POJO}
- 09:48:55.468 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{null}{0.0.0.0:0} added {org.eclipse.jetty.server.Server@7f9fcf7f,UNMANAGED}
- 09:48:55.472 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{null}{0.0.0.0:0} added {qtp1658926803{STOPPED,8<=0<=200,i=0,q=0},AUTO}
- 09:48:55.473 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{null}{0.0.0.0:0} added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@17c1bced,AUTO}
- 09:48:55.476 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{null}{0.0.0.0:0} added {org.eclipse.jetty.io.ArrayByteBufferPool@4034c28c,POJO}
- 09:48:55.477 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{null}{0.0.0.0:0} added {HttpConnectionFactory@50a7bc6e{HTTP/1.1},AUTO}
- 09:48:55.485 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:0} added {org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@e50a6f6,MANAGED}
- 09:48:55.487 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@7f9fcf7f added {ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:0},AUTO}
- 09:48:55.602 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - o.e.j.s.ServletContextHandler@1d76aeea{/,null,null} added {org.eclipse.jetty.servlet.ServletHandler@78dd667e,AUTO}
- 09:48:55.649 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@78dd667e added {de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false,AUTO}
- 09:48:55.650 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@78dd667e added {[/*]=>de.tst.camel.test.client.TestServletFactory-6b19b79,POJO}
- 09:48:55.654 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@7f9fcf7f added {o.e.j.s.ServletContextHandler@1d76aeea{/,null,null},AUTO}
- 09:48:55.655 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.Server@7f9fcf7f
- 09:48:55.688 [main] INFO org.eclipse.jetty.server.Server - jetty-9.2.15.v20160210
- 09:48:55.793 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting org.eclipse.jetty.server.Server@7f9fcf7f
- 09:48:55.799 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting qtp1658926803{STOPPED,8<=0<=200,i=0,q=0}
- 09:48:55.831 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2223ms qtp1658926803{STARTED,8<=8<=200,i=7,q=0}
- 09:48:55.831 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting o.e.j.s.ServletContextHandler@1d76aeea{/,null,null}
- 09:48:55.841 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting o.e.j.s.ServletContextHandler@1d76aeea{/,null,STARTING}
- 09:48:55.845 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.servlet.ServletHandler@78dd667e
- 09:48:55.847 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/* mapped to servlet=de.tst.camel.test.client.TestServletFactory-6b19b79 from default=false
- 09:48:55.848 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 09:48:55.848 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 09:48:55.848 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 09:48:55.848 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap={/*=de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false}
- 09:48:55.849 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={de.tst.camel.test.client.TestServletFactory-6b19b79=de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false}
- 09:48:55.850 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Adding Default404Servlet to org.eclipse.jetty.servlet.ServletHandler@78dd667e
- 09:48:55.851 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@78dd667e added {org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965@1146b66e==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false,AUTO}
- 09:48:55.852 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@78dd667e added {[/]=>org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965,POJO}
- 09:48:55.852 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/* mapped to servlet=de.tst.camel.test.client.TestServletFactory-6b19b79 from default=false
- 09:48:55.852 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/ mapped to servlet=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965 from default=false
- 09:48:55.859 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 09:48:55.859 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 09:48:55.860 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 09:48:55.860 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap={/*=de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false, /=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965@1146b66e==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 09:48:55.865 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={de.tst.camel.test.client.TestServletFactory-6b19b79=de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false, org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965@1146b66e==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 09:48:55.866 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting org.eclipse.jetty.servlet.ServletHandler@78dd667e
- 09:48:55.867 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2259ms org.eclipse.jetty.servlet.ServletHandler@78dd667e
- 09:48:55.868 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false
- 09:48:55.868 [main] DEBUG org.eclipse.jetty.servlet.BaseHolder - Holding class de.tst.camel.test.client.TestServletFactory from sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:55.872 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2263ms de.tst.camel.test.client.TestServletFactory-6b19b79@3bfabfd9==de.tst.camel.test.client.TestServletFactory,-1,false
- 09:48:55.872 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965@1146b66e==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false
- 09:48:55.873 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2265ms org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-2f112965@1146b66e==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false
- 09:48:55.873 [main] INFO org.eclipse.jetty.server.handler.ContextHandler - Started o.e.j.s.ServletContextHandler@1d76aeea{/,null,AVAILABLE}
- 09:48:55.874 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2265ms o.e.j.s.ServletContextHandler@1d76aeea{/,null,AVAILABLE}
- 09:48:55.874 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101}
- 09:48:55.888 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101} added {sun.nio.ch.ServerSocketChannelImpl[/0:0:0:0:0:0:0:0:1101],POJO}
- 09:48:55.888 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@14a2f921
- 09:48:55.891 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2283ms org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@14a2f921
- 09:48:55.898 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting HttpConnectionFactory@2c34f934{HTTP/1.1}
- 09:48:55.899 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2291ms HttpConnectionFactory@2c34f934{HTTP/1.1}
- 09:48:55.901 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@691a7f8f
- 09:48:55.925 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.io.SelectorManager$ManagedSelector@49c386c8 keys=-1 selected=-1
- 09:48:55.932 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2323ms org.eclipse.jetty.io.SelectorManager$ManagedSelector@49c386c8 keys=0 selected=0
- 09:48:55.936 [qtp1658926803-13-selector-ServerConnectorManager@691a7f8f/0] DEBUG org.eclipse.jetty.io.SelectorManager - Starting Thread[qtp1658926803-13-selector-ServerConnectorManager@691a7f8f/0,5,main] on org.eclipse.jetty.io.SelectorManager$ManagedSelector@49c386c8 keys=0 selected=0
- 09:48:55.938 [qtp1658926803-13-selector-ServerConnectorManager@691a7f8f/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 09:48:55.939 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2331ms org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@691a7f8f
- 09:48:55.960 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101} added {acceptor-0@1ed1993a,POJO}
- 09:48:55.961 [main] INFO org.eclipse.jetty.server.ServerConnector - Started ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101}
- 09:48:55.961 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2352ms ServerConnector@17c386de{HTTP/1.1}{0.0.0.0:1101}
- 09:48:55.962 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:0}
- 09:48:55.962 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:35408} added {sun.nio.ch.ServerSocketChannelImpl[/0:0:0:0:0:0:0:0:35408],POJO}
- 09:48:55.962 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@17c1bced
- 09:48:55.963 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2355ms org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@17c1bced
- 09:48:55.963 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting HttpConnectionFactory@50a7bc6e{HTTP/1.1}
- 09:48:55.963 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2355ms HttpConnectionFactory@50a7bc6e{HTTP/1.1}
- 09:48:55.963 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@e50a6f6
- 09:48:55.964 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.io.SelectorManager$ManagedSelector@1f3f4916 keys=-1 selected=-1
- 09:48:55.968 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2359ms org.eclipse.jetty.io.SelectorManager$ManagedSelector@1f3f4916 keys=0 selected=0
- 09:48:55.969 [qtp1658926803-15-selector-ServerConnectorManager@e50a6f6/0] DEBUG org.eclipse.jetty.io.SelectorManager - Starting Thread[qtp1658926803-15-selector-ServerConnectorManager@e50a6f6/0,5,main] on org.eclipse.jetty.io.SelectorManager$ManagedSelector@1f3f4916 keys=0 selected=0
- 09:48:55.969 [qtp1658926803-15-selector-ServerConnectorManager@e50a6f6/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 09:48:55.969 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2361ms org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@e50a6f6
- 09:48:55.973 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:35408} added {acceptor-0@794cb805,POJO}
- 09:48:55.973 [main] INFO org.eclipse.jetty.server.ServerConnector - Started ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:35408}
- 09:48:55.974 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2366ms ServerConnector@2d9d4f9d{HTTP/1.1}{0.0.0.0:35408}
- 09:48:55.974 [main] INFO org.eclipse.jetty.server.Server - Started @2366ms
- 09:48:55.975 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @2367ms org.eclipse.jetty.server.Server@7f9fcf7f
- 09:48:55.975 [main] INFO de.tst.camel.test.both.WssProducerConsumerTest - ********************************************************************************
- 09:48:55.976 [main] INFO de.tst.camel.test.both.WssProducerConsumerTest - Testing: testTwoRoutes(de.tst.camel.test.both.WssProducerConsumerTest)
- 09:48:55.976 [main] INFO de.tst.camel.test.both.WssProducerConsumerTest - ********************************************************************************
- 09:48:55.979 [main] DEBUG de.tst.camel.test.both.WssProducerConsumerTest - setUp test
- 09:48:56.147 [main] TRACE org.apache.camel.impl.ActiveMQUuidGenerator - Using port 0
- 09:48:56.339 [main] TRACE org.apache.camel.impl.DefaultPackageScanClassResolver - Adding ContextClassLoader from current thread: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:56.456 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.459 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.460 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.460 [main] DEBUG org.apache.camel.impl.SharedProducerServicePool - Starting service pool: org.apache.camel.impl.SharedProducerServicePool@6302bbb1
- 09:48:56.460 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:56.461 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.463 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.480 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:56.482 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ComponentResolver: org.apache.camel.impl.DefaultComponentResolver@7b2bbc3 to resolve component with name: properties
- 09:48:56.483 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: properties in registry: null
- 09:48:56.502 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: org.apache.camel.component.properties.PropertiesComponent using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:56.502 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: properties via type: org.apache.camel.component.properties.PropertiesComponent via: META-INF/services/org/apache/camel/component/properties
- 09:48:56.539 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: org.apache.camel.component.properties.PropertiesComponent
- 09:48:56.565 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: org.apache.camel.component.properties.PropertiesComponent
- 09:48:56.566 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(properties) -> org.apache.camel.component.properties.PropertiesComponent@44c03695
- 09:48:56.568 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: de.tst.camel.test.both.WssProducerConsumerTest
- 09:48:56.577 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: de.tst.camel.test.both.WssProducerConsumerTest
- 09:48:56.584 [main] DEBUG de.tst.camel.test.both.WssProducerConsumerTest - Using created route builder: Routes: []
- 09:48:56.585 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Adding routes from builder: Routes: []
- 09:48:56.586 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ComponentResolver: org.apache.camel.impl.DefaultComponentResolver@7b2bbc3 to resolve component with name: testclient
- 09:48:56.587 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: testclient in registry: null
- 09:48:56.593 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: de.tst.camel.test.client.WsComponent using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:56.597 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: testclient via type: de.tst.camel.test.client.WsComponent via: META-INF/services/org/apache/camel/component/testclient
- 09:48:56.599 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: de.tst.camel.test.client.WsComponent
- 09:48:56.617 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: de.tst.camel.test.client.WsComponent
- 09:48:56.617 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(testclient) -> de.tst.camel.test.client.WsComponent@4d1c00d0
- 09:48:56.711 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: From[direct:input]
- 09:48:56.727 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 6 properties on: From[direct:input]
- 09:48:56.730 [main] DEBUG de.tst.camel.test.both.WssProducerConsumerTest - Using created route builder: Routes: []
- 09:48:56.731 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Adding routes from builder: Routes: []
- 09:48:56.731 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ComponentResolver: org.apache.camel.impl.DefaultComponentResolver@7b2bbc3 to resolve component with name: testserver
- 09:48:56.731 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: testserver in registry: null
- 09:48:56.732 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: de.tst.camel.test.server.WebsocketComponent using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:56.736 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: testserver via type: de.tst.camel.test.server.WebsocketComponent via: META-INF/services/org/apache/camel/component/testserver
- 09:48:56.743 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: de.tst.camel.test.server.WebsocketComponent
- 09:48:56.746 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: de.tst.camel.test.server.WebsocketComponent
- 09:48:56.746 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(testserver) -> de.tst.camel.test.server.WebsocketComponent@37f1104d
- 09:48:56.746 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: From[testserver:localhost:9292/echo]
- 09:48:56.747 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 6 properties on: From[testserver:localhost:9292/echo]
- 09:48:56.747 [main] INFO org.apache.camel.impl.DefaultCamelContext - Apache Camel 2.16.3 (CamelContext: camel-1) is starting
- 09:48:56.748 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.749 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ClassResolver=org.apache.camel.impl.DefaultClassResolver@5ab9e72c, PackageScanClassResolver=org.apache.camel.impl.DefaultPackageScanClassResolver@186f8716, ApplicationContextClassLoader=null
- 09:48:56.749 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.749 [main] INFO org.apache.camel.management.DefaultManagementStrategy - JMX is disabled
- 09:48:56.759 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: org.apache.camel.impl.converter.ToStringTypeConverter@6497b078 which can promote: false
- 09:48:56.760 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: org.apache.camel.impl.converter.EnumTypeConverter@5f683daf which can promote: true
- 09:48:56.761 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: org.apache.camel.impl.converter.ArrayTypeConverter@76f2bbc1 which can promote: true
- 09:48:56.762 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: org.apache.camel.impl.converter.FutureTypeConverter@6c779568 which can promote: false
- 09:48:56.762 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: org.apache.camel.impl.converter.AsyncProcessorTypeConverter@7e9131d5 which can promote: true
- 09:48:56.763 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.768 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Searching for META-INF/services/org/apache/camel/TypeConverter services
- 09:48:56.769 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Found converter packages to scan: org.apache.camel.converter
- 09:48:56.769 [main] DEBUG org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Found 3 packages with 16 @Converter classes to load
- 09:48:56.769 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.jaxp.StaxConverter
- 09:48:56.777 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLEventWriter(java.io.Writer) throws javax.xml.stream.XMLStreamException
- 09:48:56.778 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLEventWriter(java.io.OutputStream,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.778 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLEventWriter(javax.xml.transform.Result) throws javax.xml.stream.XMLStreamException
- 09:48:56.779 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamWriter(javax.xml.transform.Result) throws javax.xml.stream.XMLStreamException
- 09:48:56.780 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamWriter(java.io.Writer) throws javax.xml.stream.XMLStreamException
- 09:48:56.780 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamWriter org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamWriter(java.io.OutputStream,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.780 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamReader org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamReader(javax.xml.transform.Source) throws javax.xml.stream.XMLStreamException
- 09:48:56.780 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamReader org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamReader(java.io.Reader) throws javax.xml.stream.XMLStreamException
- 09:48:56.780 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamReader org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamReader(java.lang.String) throws javax.xml.stream.XMLStreamException
- 09:48:56.781 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamReader org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamReader(java.io.InputStream,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.781 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLStreamReader org.apache.camel.converter.jaxp.StaxConverter.createXMLStreamReader(java.io.File,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException,java.io.FileNotFoundException
- 09:48:56.781 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventReader org.apache.camel.converter.jaxp.StaxConverter.createXMLEventReader(java.io.File,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException,java.io.FileNotFoundException
- 09:48:56.781 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventReader org.apache.camel.converter.jaxp.StaxConverter.createXMLEventReader(javax.xml.transform.Source) throws javax.xml.stream.XMLStreamException
- 09:48:56.781 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventReader org.apache.camel.converter.jaxp.StaxConverter.createXMLEventReader(java.io.InputStream,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.782 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventReader org.apache.camel.converter.jaxp.StaxConverter.createXMLEventReader(java.io.Reader) throws javax.xml.stream.XMLStreamException
- 09:48:56.782 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.stream.XMLEventReader org.apache.camel.converter.jaxp.StaxConverter.createXMLEventReader(javax.xml.stream.XMLStreamReader) throws javax.xml.stream.XMLStreamException
- 09:48:56.782 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.TimePatternConverter
- 09:48:56.786 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static long org.apache.camel.converter.TimePatternConverter.toMilliSeconds(java.lang.String) throws java.lang.IllegalArgumentException
- 09:48:56.787 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.CamelConverter
- 09:48:56.787 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.Processor org.apache.camel.converter.CamelConverter.toProcessor(org.apache.camel.Predicate)
- 09:48:56.788 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.Processor org.apache.camel.converter.CamelConverter.toProcessor(org.apache.camel.Expression)
- 09:48:56.788 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.component.bean.BeanConverter
- 09:48:56.795 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: StaticMethodFallbackTypeConverter: public static java.lang.Object org.apache.camel.component.bean.BeanConverter.convertTo(java.lang.Class,org.apache.camel.Exchange,java.lang.Object,org.apache.camel.spi.TypeConverterRegistry) which can promote: false
- 09:48:56.796 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.IOConverter
- 09:48:56.797 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toBytes(java.io.InputStream) throws java.io.IOException
- 09:48:56.802 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.OutputStream org.apache.camel.converter.IOConverter.toOutputStream(java.io.File) throws java.io.FileNotFoundException
- 09:48:56.802 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.BufferedWriter org.apache.camel.converter.IOConverter.toWriter(java.io.File,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.802 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.Writer org.apache.camel.converter.IOConverter.toWriter(java.io.OutputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.804 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.ObjectOutput org.apache.camel.converter.IOConverter.toObjectOutput(java.io.OutputStream) throws java.io.IOException
- 09:48:56.804 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.io.BufferedReader,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.805 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.lang.StringBuilder,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.805 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.lang.String,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.812 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.lang.StringBuffer,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.814 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.net.URL) throws java.io.IOException
- 09:48:56.814 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.io.File) throws java.io.IOException
- 09:48:56.815 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(java.io.ByteArrayOutputStream)
- 09:48:56.815 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.IOConverter.toInputStream(byte[])
- 09:48:56.816 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.BufferedReader org.apache.camel.converter.IOConverter.toReader(java.io.File,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.819 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.StringReader org.apache.camel.converter.IOConverter.toReader(java.lang.String)
- 09:48:56.820 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.Reader org.apache.camel.converter.IOConverter.toReader(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.823 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.ObjectInput org.apache.camel.converter.IOConverter.toObjectInput(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.826 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Properties org.apache.camel.converter.IOConverter.toProperties(java.io.Reader) throws java.io.IOException
- 09:48:56.830 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Properties org.apache.camel.converter.IOConverter.toProperties(java.io.InputStream) throws java.io.IOException
- 09:48:56.831 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Properties org.apache.camel.converter.IOConverter.toProperties(java.io.File) throws java.io.IOException
- 09:48:56.831 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(byte[],org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.831 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.net.URL,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.831 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.io.ByteArrayOutputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.831 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.io.File,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.832 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.832 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.io.BufferedReader) throws java.io.IOException
- 09:48:56.832 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.IOConverter.toString(java.io.Reader) throws java.io.IOException
- 09:48:56.832 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.File org.apache.camel.converter.IOConverter.toFile(java.lang.String)
- 09:48:56.833 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toByteArray(java.io.ByteArrayOutputStream)
- 09:48:56.833 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toByteArray(java.lang.String,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.836 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toByteArray(java.io.BufferedReader,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.836 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toByteArray(java.io.Reader,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.836 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.IOConverter.toByteArray(java.io.File) throws java.io.IOException
- 09:48:56.837 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.jaxp.XmlConverter
- 09:48:56.842 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.lang.Boolean org.apache.camel.converter.jaxp.XmlConverter.toBoolean(org.w3c.dom.NodeList)
- 09:48:56.846 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.io.InputStream org.apache.camel.converter.jaxp.XmlConverter.toInputStream(javax.xml.transform.dom.DOMSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException,java.io.IOException
- 09:48:56.848 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.io.InputStream org.apache.camel.converter.jaxp.XmlConverter.toInputStream(org.w3c.dom.Document,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException,java.io.IOException
- 09:48:56.851 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.apache.camel.BytesSource org.apache.camel.converter.jaxp.XmlConverter.toBytesSource(byte[])
- 09:48:56.866 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.apache.camel.StringSource org.apache.camel.converter.jaxp.XmlConverter.toStringSource(java.lang.String)
- 09:48:56.867 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.Source org.apache.camel.converter.jaxp.XmlConverter.toSource(java.lang.String)
- 09:48:56.867 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(javax.xml.transform.Source,org.apache.camel.Exchange) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.867 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(byte[]) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.867 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(java.lang.String) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.867 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(java.io.File,org.apache.camel.Exchange) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.868 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(java.io.InputStream,org.apache.camel.Exchange) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.868 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(org.w3c.dom.Node) throws javax.xml.parsers.ParserConfigurationException,javax.xml.transform.TransformerException
- 09:48:56.868 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSource(org.w3c.dom.Document)
- 09:48:56.868 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(java.lang.String,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.868 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(org.xml.sax.InputSource,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.870 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(javax.xml.transform.Source) throws javax.xml.transform.TransformerException,javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.870 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(java.io.File,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.870 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(byte[],org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.871 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.871 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(java.io.Reader,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException
- 09:48:56.871 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocument(org.w3c.dom.Node) throws javax.xml.parsers.ParserConfigurationException,javax.xml.transform.TransformerException
- 09:48:56.872 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSourceFromSAX(javax.xml.transform.sax.SAXSource) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException,javax.xml.transform.TransformerException
- 09:48:56.872 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSourceFromStream(javax.xml.transform.stream.StreamSource,org.apache.camel.Exchange) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.872 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.dom.DOMSource org.apache.camel.converter.jaxp.XmlConverter.toDOMSourceFromStAX(javax.xml.transform.stax.StAXSource) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.parsers.ParserConfigurationException,javax.xml.transform.TransformerException
- 09:48:56.872 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSource(java.io.File,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.872 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSource(java.lang.String,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSource(byte[],org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSource(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSource(javax.xml.transform.Source,org.apache.camel.Exchange) throws java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stax.StAXSource org.apache.camel.converter.jaxp.XmlConverter.toStAXSource(byte[],org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stax.StAXSource org.apache.camel.converter.jaxp.XmlConverter.toStAXSource(java.lang.String,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stax.StAXSource org.apache.camel.converter.jaxp.XmlConverter.toStAXSource(java.io.File,org.apache.camel.Exchange) throws java.io.FileNotFoundException,javax.xml.stream.XMLStreamException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stax.StAXSource org.apache.camel.converter.jaxp.XmlConverter.toStAXSource(java.io.InputStream,org.apache.camel.Exchange) throws javax.xml.stream.XMLStreamException
- 09:48:56.873 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(byte[],org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.874 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(java.nio.ByteBuffer,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.874 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(java.io.File) throws javax.xml.transform.TransformerException
- 09:48:56.874 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(java.io.Reader) throws javax.xml.transform.TransformerException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(javax.xml.transform.Source,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSource(java.io.InputStream) throws javax.xml.transform.TransformerException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSourceFromDOM(javax.xml.transform.dom.DOMSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSourceFromStream(javax.xml.transform.stream.StreamSource,org.apache.camel.Exchange) throws org.xml.sax.SAXException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.sax.SAXSource org.apache.camel.converter.jaxp.XmlConverter.toSAXSourceFromStAX(javax.xml.transform.stax.StAXSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.875 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSourceFromDOM(javax.xml.transform.dom.DOMSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.876 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSourceFromSAX(javax.xml.transform.sax.SAXSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.876 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public javax.xml.transform.stream.StreamSource org.apache.camel.converter.jaxp.XmlConverter.toStreamSourceFromStAX(javax.xml.transform.stax.StAXSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.876 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.io.Reader org.apache.camel.converter.jaxp.XmlConverter.toReaderFromSource(javax.xml.transform.Source,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.876 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Node org.apache.camel.converter.jaxp.XmlConverter.toDOMNodeFromSAX(javax.xml.transform.sax.SAXSource) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.876 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Node org.apache.camel.converter.jaxp.XmlConverter.toDOMNodeFromStAX(javax.xml.transform.stax.StAXSource) throws javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException,javax.xml.transform.TransformerException
- 09:48:56.877 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Node org.apache.camel.converter.jaxp.XmlConverter.toDOMNodeFromSingleNodeList(org.w3c.dom.NodeList)
- 09:48:56.877 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Document org.apache.camel.converter.jaxp.XmlConverter.toDOMDocumentFromSingleNodeList(org.w3c.dom.NodeList) throws javax.xml.parsers.ParserConfigurationException,javax.xml.transform.TransformerException
- 09:48:56.877 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Node org.apache.camel.converter.jaxp.XmlConverter.toDOMNode(javax.xml.transform.Source) throws javax.xml.transform.TransformerException,javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.877 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Element org.apache.camel.converter.jaxp.XmlConverter.toDOMElement(org.w3c.dom.Node) throws javax.xml.transform.TransformerException
- 09:48:56.877 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.w3c.dom.Element org.apache.camel.converter.jaxp.XmlConverter.toDOMElement(javax.xml.transform.Source) throws javax.xml.transform.TransformerException,javax.xml.parsers.ParserConfigurationException,java.io.IOException,org.xml.sax.SAXException
- 09:48:56.878 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.xml.sax.InputSource org.apache.camel.converter.jaxp.XmlConverter.toInputSource(java.io.File,org.apache.camel.Exchange) throws java.io.FileNotFoundException
- 09:48:56.878 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public org.xml.sax.InputSource org.apache.camel.converter.jaxp.XmlConverter.toInputSource(java.io.InputStream,org.apache.camel.Exchange)
- 09:48:56.878 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.lang.String org.apache.camel.converter.jaxp.XmlConverter.toString(org.w3c.dom.Node,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.878 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.lang.String org.apache.camel.converter.jaxp.XmlConverter.toString(javax.xml.transform.Source,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.879 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public byte[] org.apache.camel.converter.jaxp.XmlConverter.toByteArray(javax.xml.transform.Source,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.879 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.ObjectConverter
- 09:48:56.879 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Iterable org.apache.camel.converter.ObjectConverter.iterable(java.lang.Object)
- 09:48:56.879 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Boolean org.apache.camel.converter.ObjectConverter.toBoolean(java.lang.String)
- 09:48:56.880 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Boolean org.apache.camel.converter.ObjectConverter.toBoolean(java.lang.Object)
- 09:48:56.880 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Long org.apache.camel.converter.ObjectConverter.toLong(java.lang.String)
- 09:48:56.880 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Long org.apache.camel.converter.ObjectConverter.toLong(java.lang.Object)
- 09:48:56.880 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static boolean org.apache.camel.converter.ObjectConverter.toBool(java.lang.Object)
- 09:48:56.880 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Byte org.apache.camel.converter.ObjectConverter.toByte(java.lang.Object)
- 09:48:56.890 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Float org.apache.camel.converter.ObjectConverter.toFloat(java.lang.Object)
- 09:48:56.890 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Float org.apache.camel.converter.ObjectConverter.toFloat(java.lang.String)
- 09:48:56.890 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Double org.apache.camel.converter.ObjectConverter.toDouble(java.lang.Object)
- 09:48:56.890 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Double org.apache.camel.converter.ObjectConverter.toDouble(java.lang.String)
- 09:48:56.890 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Character org.apache.camel.converter.ObjectConverter.toCharacter(java.lang.String)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static char org.apache.camel.converter.ObjectConverter.toChar(java.lang.String)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.fromCharArray(char[])
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Short org.apache.camel.converter.ObjectConverter.toShort(java.lang.Object)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Integer org.apache.camel.converter.ObjectConverter.toInteger(java.lang.String)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Integer org.apache.camel.converter.ObjectConverter.toInteger(java.lang.Object)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.toString(java.lang.Integer)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.toString(java.lang.Long)
- 09:48:56.891 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.toString(java.lang.StringBuilder)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.toString(java.lang.StringBuffer)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.ObjectConverter.toString(java.lang.Boolean)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static char[] org.apache.camel.converter.ObjectConverter.toCharArray(java.lang.String)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Iterator org.apache.camel.converter.ObjectConverter.iterator(java.lang.Object)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Class org.apache.camel.converter.ObjectConverter.toClass(java.lang.Object,org.apache.camel.Exchange)
- 09:48:56.892 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.SQLConverter
- 09:48:56.893 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Long org.apache.camel.converter.SQLConverter.toLong(java.sql.Timestamp)
- 09:48:56.893 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.sql.Timestamp org.apache.camel.converter.SQLConverter.toTimestamp(java.lang.Long)
- 09:48:56.893 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.stream.StreamCacheConverter
- 09:48:56.896 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(org.apache.camel.BytesSource)
- 09:48:56.896 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(javax.xml.transform.sax.SAXSource,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.896 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(java.io.InputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(java.io.Reader,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(java.io.ByteArrayInputStream,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(javax.xml.transform.stream.StreamSource,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static org.apache.camel.StreamCache org.apache.camel.converter.stream.StreamCacheConverter.convertToStreamCache(org.apache.camel.StringSource)
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.Serializable org.apache.camel.converter.stream.StreamCacheConverter.convertToSerializable(org.apache.camel.StreamCache,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.stream.StreamCacheConverter.convertToByteArray(org.apache.camel.StreamCache,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.897 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.component.file.GenericFileConverter
- 09:48:56.899 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding fallback type converter: StaticMethodFallbackTypeConverter: public static java.lang.Object org.apache.camel.component.file.GenericFileConverter.convertTo(java.lang.Class,org.apache.camel.Exchange,java.lang.Object,org.apache.camel.spi.TypeConverterRegistry) throws java.io.IOException,org.apache.camel.NoTypeConversionAvailableException which can promote: false
- 09:48:56.900 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.component.file.GenericFileConverter.genericFileToInputStream(org.apache.camel.component.file.GenericFile,org.apache.camel.Exchange) throws java.io.IOException,org.apache.camel.NoTypeConversionAvailableException
- 09:48:56.900 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.component.file.GenericFileConverter.genericFileToString(org.apache.camel.component.file.GenericFile,org.apache.camel.Exchange) throws java.io.IOException,org.apache.camel.NoTypeConversionAvailableException
- 09:48:56.900 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.Serializable org.apache.camel.component.file.GenericFileConverter.genericFileToSerializable(org.apache.camel.component.file.GenericFile,org.apache.camel.Exchange) throws java.io.IOException,org.apache.camel.NoTypeConversionAvailableException
- 09:48:56.900 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.DateTimeConverter
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Long org.apache.camel.converter.DateTimeConverter.toLong(java.util.Date)
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.TimeZone org.apache.camel.converter.DateTimeConverter.toTimeZone(java.lang.String)
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Date org.apache.camel.converter.DateTimeConverter.toDate(java.lang.Long)
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.jaxp.DomConverter
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Long org.apache.camel.converter.jaxp.DomConverter.toLong(org.w3c.dom.NodeList)
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.io.InputStream org.apache.camel.converter.jaxp.DomConverter.toInputStream(org.w3c.dom.NodeList,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException,java.io.UnsupportedEncodingException
- 09:48:56.901 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.List org.apache.camel.converter.jaxp.DomConverter.toList(org.w3c.dom.NodeList)
- 09:48:56.902 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Integer org.apache.camel.converter.jaxp.DomConverter.toInteger(org.w3c.dom.NodeList)
- 09:48:56.902 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public java.lang.String org.apache.camel.converter.jaxp.DomConverter.toString(org.w3c.dom.NodeList,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException
- 09:48:56.902 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: InstanceMethodTypeConverter: public byte[] org.apache.camel.converter.jaxp.DomConverter.toByteArray(org.w3c.dom.NodeList,org.apache.camel.Exchange) throws javax.xml.transform.TransformerException,java.io.UnsupportedEncodingException
- 09:48:56.902 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.CollectionConverter
- 09:48:56.906 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.List org.apache.camel.converter.CollectionConverter.toList(java.util.Collection)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.List org.apache.camel.converter.CollectionConverter.toList(java.lang.Object[])
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.List org.apache.camel.converter.CollectionConverter.toList(java.lang.Iterable)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.ArrayList org.apache.camel.converter.CollectionConverter.toArrayList(java.util.Iterator)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Set org.apache.camel.converter.CollectionConverter.toSet(java.util.Collection)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Set org.apache.camel.converter.CollectionConverter.toSet(java.util.Map)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Set org.apache.camel.converter.CollectionConverter.toSet(java.lang.Object[])
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Properties org.apache.camel.converter.CollectionConverter.toProperties(java.util.Map)
- 09:48:56.907 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.Hashtable org.apache.camel.converter.CollectionConverter.toHashtable(java.util.Map)
- 09:48:56.908 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.util.HashMap org.apache.camel.converter.CollectionConverter.toHashMap(java.util.Map)
- 09:48:56.908 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.Object[] org.apache.camel.converter.CollectionConverter.toArray(java.util.Collection)
- 09:48:56.908 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.NIOConverter
- 09:48:56.909 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.NIOConverter.toInputStream(java.nio.ByteBuffer)
- 09:48:56.909 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.String,org.apache.camel.Exchange)
- 09:48:56.909 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.Float)
- 09:48:56.909 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.Integer)
- 09:48:56.913 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.Long)
- 09:48:56.913 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.Short)
- 09:48:56.913 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.lang.Double)
- 09:48:56.913 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(byte[])
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.nio.ByteBuffer org.apache.camel.converter.NIOConverter.toByteBuffer(java.io.File) throws java.io.IOException
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.lang.String org.apache.camel.converter.NIOConverter.toString(java.nio.ByteBuffer,org.apache.camel.Exchange) throws java.io.IOException
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static byte[] org.apache.camel.converter.NIOConverter.toByteArray(java.nio.ByteBuffer)
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.converter.jaxp.StreamSourceConverter
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.InputStream org.apache.camel.converter.jaxp.StreamSourceConverter.toInputStream(javax.xml.transform.stream.StreamSource)
- 09:48:56.914 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Adding type converter: StaticMethodTypeConverter: public static java.io.Reader org.apache.camel.converter.jaxp.StreamSourceConverter.toReader(javax.xml.transform.stream.StreamSource)
- 09:48:56.915 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading converter class: org.apache.camel.impl.converter.FutureTypeConverter
- 09:48:56.915 [main] TRACE org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Searching for META-INF/services/org/apache/camel/TypeConverter services
- 09:48:56.915 [main] DEBUG org.apache.camel.impl.converter.AnnotationTypeConverterLoader - Loading file META-INF/services/org/apache/camel/TypeConverter to retrieve list of packages, from url: jar:file:/home/gbrost/.m2/repository/org/apache/camel/camel-core/2.16.3/camel-core-2.16.3.jar!/META-INF/services/org/apache/camel/TypeConverter
- 09:48:56.916 [main] DEBUG org.apache.camel.impl.converter.AnnotationTypeConverterLoader - No additional package names found in classpath for annotated type converters.
- 09:48:56.916 [main] INFO org.apache.camel.impl.converter.DefaultTypeConverter - Loaded 182 type converters
- 09:48:56.921 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.924 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:56.924 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.924 [main] DEBUG org.apache.camel.impl.SharedPollingConsumerServicePool - Starting service pool: org.apache.camel.impl.SharedPollingConsumerServicePool@932bc4a
- 09:48:56.924 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.924 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.924 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.925 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.925 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.941 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.941 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.944 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.946 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.958 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: direct:input
- 09:48:56.974 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: direct:input, normalized uri: direct://input
- 09:48:56.978 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Endpoint uri: direct://input is from component with name: direct
- 09:48:56.979 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ComponentResolver: org.apache.camel.impl.DefaultComponentResolver@7b2bbc3 to resolve component with name: direct
- 09:48:56.979 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: direct in registry: null
- 09:48:56.980 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: org.apache.camel.component.direct.DirectComponent using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:56.981 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: direct via type: org.apache.camel.component.direct.DirectComponent via: META-INF/services/org/apache/camel/component/direct
- 09:48:56.982 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: org.apache.camel.component.direct.DirectComponent
- 09:48:56.983 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: org.apache.camel.component.direct.DirectComponent
- 09:48:56.983 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.983 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(direct) -> org.apache.camel.component.direct.DirectComponent@429bffaa
- 09:48:56.984 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Creating endpoint from uri: direct://input using component: org.apache.camel.component.direct.DirectComponent@429bffaa
- 09:48:56.985 [main] TRACE org.apache.camel.impl.DefaultComponent - Creating endpoint uri=[direct://input], path=[input], parameters=[{}]
- 09:48:56.996 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - direct://input converted to endpoint: Endpoint[direct://input] by component: org.apache.camel.component.direct.DirectComponent@429bffaa
- 09:48:56.997 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:56.997 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: Log[>>> Message from direct to WebSocket Client : ${body}]
- 09:48:57.030 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from direct to WebSocket Client : ${body}]
- 09:48:57.030 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving known fields for: Log[>>> Message from direct to WebSocket Client : ${body}]
- 09:48:57.031 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from direct to WebSocket Client : ${body}]
- 09:48:57.032 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: org.apache.camel.language.simple.SimpleLanguage using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:57.034 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: org.apache.camel.language.simple.SimpleLanguage
- 09:48:57.034 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: org.apache.camel.language.simple.SimpleLanguage
- 09:48:57.093 [main] DEBUG org.apache.camel.model.LogDefinition - The LogName is null. Falling back to create logger by using the route id foo.
- 09:48:57.110 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'Log[>>> Message from direct to WebSocket Client : ${body}]'
- 09:48:57.116 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:57.121 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:57.125 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from direct to WebSocket Client : ${body}] is configured to inheritErrorHandler
- 09:48:57.142 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from direct to WebSocket Client : ${body}] wrapped in Channel: Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]]
- 09:48:57.144 [main] TRACE org.apache.camel.model.LogDefinition - Adding event driven processor: Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]]
- 09:48:57.144 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: To[testclient://localhost:9292/echo]
- 09:48:57.148 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 10 properties on: To[testclient://localhost:9292/echo]
- 09:48:57.148 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving known fields for: To[testclient://localhost:9292/echo]
- 09:48:57.148 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 10 properties on: To[testclient://localhost:9292/echo]
- 09:48:57.148 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: testclient://localhost:9292/echo
- 09:48:57.148 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: testclient://localhost:9292/echo, normalized uri: testclient://localhost:9292/echo
- 09:48:57.149 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Endpoint uri: testclient://localhost:9292/echo is from component with name: testclient
- 09:48:57.149 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(testclient) -> de.tst.camel.test.client.WsComponent@4d1c00d0
- 09:48:57.149 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Creating endpoint from uri: testclient://localhost:9292/echo using component: de.tst.camel.test.client.WsComponent@4d1c00d0
- 09:48:57.149 [main] TRACE org.apache.camel.impl.DefaultComponent - Creating endpoint uri=[testclient://localhost:9292/echo], path=[localhost:9292/echo], parameters=[{}]
- 09:48:57.156 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - testclient://localhost:9292/echo converted to endpoint: Endpoint[testclient://localhost:9292/echo] by component: de.tst.camel.test.client.WsComponent@4d1c00d0
- 09:48:57.156 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:57.157 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Creating SSLContext from SSLContextParameters [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null]].
- 09:48:57.263 [main] INFO org.apache.camel.util.jsse.SSLContextParameters - Available providers: {Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}.
- 09:48:57.264 [main] TRACE org.apache.camel.util.jsse.KeyManagersParameters - Creating KeyManager[] from KeyManagersParameters [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]].
- 09:48:57.270 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManagerFactory [javax.net.ssl.KeyManagerFactory@45099dd3], initialized from [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [SunX509].
- 09:48:57.272 [main] TRACE org.apache.camel.util.jsse.KeyStoreParameters - Creating KeyStore instance from KeyStoreParameters [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null]].
- 09:48:57.279 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a file.
- 09:48:57.283 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a file.
- java.io.FileNotFoundException: file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks (No such file or directory)
- at java.io.FileInputStream.open0(Native Method) ~[?:1.8.0_91]
- at java.io.FileInputStream.open(FileInputStream.java:195) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:138) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:93) ~[?:1.8.0_91]
- at org.apache.camel.util.jsse.JsseParameters.resolveResource(JsseParameters.java:125) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyStoreParameters.createKeyStore(KeyStoreParameters.java:174) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyManagersParameters.createKeyManagers(KeyManagersParameters.java:108) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.SSLContextParameters.createSSLContext(SSLContextParameters.java:256) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.component.ahc.AhcEndpoint.doStart(AhcEndpoint.java:251) [camel-ahc-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startService(DefaultCamelContext.java:3234) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doAddService(DefaultCamelContext.java:1209) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.addService(DefaultCamelContext.java:1170) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.addService(DefaultCamelContext.java:1166) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.getEndpoint(DefaultCamelContext.java:583) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.CamelContextHelper.getMandatoryEndpoint(CamelContextHelper.java:79) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.resolveEndpoint(RouteDefinition.java:211) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultRouteContext.resolveEndpoint(DefaultRouteContext.java:107) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultRouteContext.resolveEndpoint(DefaultRouteContext.java:113) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.SendDefinition.resolveEndpoint(SendDefinition.java:62) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.SendDefinition.createProcessor(SendDefinition.java:56) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.makeProcessorImpl(ProcessorDefinition.java:535) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.makeProcessor(ProcessorDefinition.java:496) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.addRoutes(ProcessorDefinition.java:220) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.addRoutes(RouteDefinition.java:1069) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.addRoutes(RouteDefinition.java:196) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startRoute(DefaultCamelContext.java:944) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startRouteDefinitions(DefaultCamelContext.java:3260) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartCamel(DefaultCamelContext.java:2983) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.access$000(DefaultCamelContext.java:175) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2814) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doWithDefinedClassLoader(DefaultCamelContext.java:2833) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStart(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.start(DefaultCamelContext.java:2779) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.startCamelContext(CamelTestSupport.java:544) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.doSetUp(CamelTestSupport.java:334) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.setUp(CamelTestSupport.java:238) [camel-test-2.16.3.jar:2.16.3]
- at de.tst.camel.test.both.WssProducerConsumerTest.setUp(WssProducerConsumerTest.java:97) [test-classes/:?]
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_91]
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_91]
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_91]
- at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_91]
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) [junit-4.12.jar:4.12]
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:24) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.RunRules.evaluate(RunRules.java:20) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.run(ParentRunner.java:363) [junit-4.12.jar:4.12]
- at org.eclipse.jdt.internal.junit4.runner.JUnit4TestReference.run(JUnit4TestReference.java:86) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.java:38) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:459) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:678) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRunner.java:382) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRunner.java:192) [.cp/:?]
- 09:48:57.292 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a class path resource with the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.294 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a class path resource using the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.295 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [sun.misc.Launcher$AppClassLoader@38af3868] as a class path resource using the classloader [{}].
- 09:48:57.296 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a class path resource using the classloader [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.296 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a URL.
- 09:48:57.296 [main] DEBUG org.apache.camel.util.jsse.JsseParameters - Opened resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks] as a URL.
- 09:48:57.366 [main] DEBUG org.apache.camel.util.jsse.KeyStoreParameters - KeyStore [java.security.KeyStore@55a147cc], initialized from [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null]], is using provider [{Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [client].
- ***
- found key for : client
- chain [0] = [
- [
- Version: V3
- Subject: CN=Test Client, OU=MyDepartment, O=MyCompany, L=Munich, ST=Bavaria, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 25875904687212624362317885024235934674866240114627652796342612438865381083810589568591128239552130579122547147942760181057632138805267061165036914521707539343826617980484344307006033023704832676407133427075708207269364690009649950888834594438984790689377911417327803373598395745744315632242475705167745512473002186223705601940027919168888967357198116462940212938357562382945671611815156646252764740719145603383997279288370892676033634141230900585576310509617055357710641430526032397881669766427177629075358516334846157853724521116788660538107997433875191973604254487787620725673805842878353682205795020545017681012089
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:37:56 CEST 2016,
- To: Thu Oct 25 09:37:56 CEST 2018]
- Issuer: CN=Test SubCA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 6
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [3]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [4]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [5]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- ]
- [6]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: D3 51 F8 E8 3C 33 FC 9B 9D D7 F7 6E D3 7A C1 CC .Q..<3.....n.z..
- 0010: 3D 0D F8 2E =...
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 93 80 CA FE DA 64 C5 28 D8 7E 0F 23 2C A6 0E 48 .....d.(...#,..H
- 0010: 34 5A FF 5E E8 9A C9 48 C6 46 16 5B 9D 5E 66 BF 4Z.^...H.F.[.^f.
- 0020: 14 D3 9D F3 C9 63 CC EB 65 34 F6 E7 E2 7C D8 A0 .....c..e4......
- 0030: 48 DE 32 8C F2 1B 98 FA 69 13 B0 3B 88 5E DF 2B H.2.....i..;.^.+
- 0040: D3 8E 7D 4E 8E C7 B7 30 E6 E1 E0 A1 3E AB B4 49 ...N...0....>..I
- 0050: 23 4F 28 94 F8 A3 93 5C 84 C8 1F 67 86 B1 9B E1 #O(....\...g....
- 0060: FF 58 C5 24 1A F4 F2 B2 5D B8 75 32 77 BC ED C2 .X.$....].u2w...
- 0070: F1 F3 71 51 6F 71 3F 65 2D 50 FE 28 BF D4 3D 48 ..qQoq?e-P.(..=H
- 0080: 08 2F 98 8C 78 F4 A6 E1 F5 8B 6E 85 CA 8F 56 BD ./..x.....n...V.
- 0090: C7 B9 02 95 A1 CA 3C 7B 85 7E BD 0A 69 8B 3E A9 ......<.....i.>.
- 00A0: 8D 93 39 53 0A EC 4E BA C5 A0 D9 7A 54 9C E9 F2 ..9S..N....zT...
- 00B0: A5 15 DA 37 F0 2E 15 3C 49 AE AD AF 33 9D 0C E3 ...7...<I...3...
- 00C0: C8 EC C8 B4 32 7C 6A AB 08 C4 71 F7 EB 4F CC 41 ....2.j...q..O.A
- 00D0: 5A 4C 39 4A 8F 10 1E BD 3A DD 68 12 2E BF CD 3E ZL9J....:.h....>
- 00E0: 6A 81 7A 98 93 13 BF CF 41 36 01 CF 1C 19 C3 7F j.z.....A6......
- 00F0: 92 40 B2 0C 98 12 5B 1F 88 AF 23 A4 C8 6A 6B 5E .@....[...#..jk^
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 26631545169559909230644768517141423752587936995376103841916319711589604204657412965085012857613884736340404856156055730865366293452487088032192693197115272441309759692119853059588457702024310176286735623930806732223217746707553162920026328869975003955119995376544166185370171169754372937503191991895430322266330639043068107814272353729016677147704110258330738274123675092182231270336660156341013822146156531604782194936726777505454634586992024194343729864238470993219746161883279675292359116443207963682462389190768365005135861009362967140179446538991559245820502973316731788494182116238178045967298158538348480713037
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Wed Oct 23 09:36:19 CEST 2024]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 91 86 4A DF ED 72 4C 30 E0 86 D2 12 BC 82 DB 73 ..J..rL0.......s
- 0010: 73 A7 DC 1A 51 B7 68 9B 1F 20 58 A3 6D 5F 53 6F s...Q.h.. X.m_So
- 0020: 42 12 D5 C1 5C 82 D1 E8 CA 47 61 45 A7 BD B3 60 B...\....GaE...`
- 0030: 92 01 0C 90 08 C3 15 FE E8 9F EF 85 C0 13 38 25 ..............8%
- 0040: 9B 5A 71 D8 3F 2D 0C 06 FC A3 EC 7E 99 88 4F 77 .Zq.?-........Ow
- 0050: 95 8A 44 63 48 9D 3A 30 22 54 73 25 96 66 1F 23 ..DcH.:0"Ts%.f.#
- 0060: 17 A8 D6 A5 F3 59 2F 41 87 DE 34 7F 12 98 BA AD .....Y/A..4.....
- 0070: 6F ED B8 B6 6E 2C C2 0C E7 78 39 E4 63 58 90 83 o...n,...x9.cX..
- 0080: 2B C7 EA DF 27 61 BA 57 9D D9 82 51 F0 0D 00 5E +...'a.W...Q...^
- 0090: BA 03 32 9D 51 A2 69 D4 A7 A3 5B 17 9D 3F F0 0E ..2.Q.i...[..?..
- 00A0: E7 4B CD 3E 6C 83 D4 3A 2C FE 33 9A E3 F3 2C CA .K.>l..:,.3...,.
- 00B0: EE 6A 12 01 54 73 C0 7E 69 A1 21 CA 5E 1D FB 0F .j..Ts..i.!.^...
- 00C0: E2 1B 46 4E 9F E3 4F DD BD 86 F3 8A E4 BA 68 F1 ..FN..O.......h.
- 00D0: 30 E7 A7 1B CA A7 90 68 0C 0A 51 62 40 8E 5D 77 0......h..Qb@.]w
- 00E0: 47 2F 1D F3 6D 6A 5D C8 52 D8 30 D7 A4 E3 C0 6F G/..mj].R.0....o
- 00F0: EA B2 75 99 88 31 4E 35 96 FF 20 FA AD 15 24 6B ..u..1N5.. ...$k
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
- Key: Sun RSA public key, 2048 bits
- modulus: 21614797379343951874063560426666435817765804479254937174344617783446070293504573872083026160705569565210812742004667604650861924545507924869082180535728855063107699051629520028088509890238676139784840816403038623216715215937709028135784989878225131123560489367685617129784581943689922756036136019263207604359599950402845747582709049931050550113248498210094031108669553570309004666029329989061171507007407888466064368567345515996525419672802677026087475471995473656928759075978348832385752404966781376484507135996003989017552715979352721517675529496859338972037423806416908469445902511278769181221473628003736339491043
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Mon Oct 20 09:36:19 CEST 2036]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ b325e3cb 741b928f]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- Non_repudiation
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- ]
- Algorithm: [SHA1withRSA]
- Signature:
- 0000: 47 FE 9A A4 A6 2D DC 77 09 5E 87 FB 7D 7E 15 10 G....-.w.^......
- 0010: 51 07 70 DC 3B D8 5C B8 07 0B 77 7C A6 AF 35 7A Q.p.;.\...w...5z
- 0020: 0D 02 03 6B 17 0F 0D 47 A2 22 68 CA C7 50 7E D4 ...k...G."h..P..
- 0030: C3 2A 52 56 85 E4 50 1E 45 94 2E C2 2B 20 8B AC .*RV..P.E...+ ..
- 0040: 6F F5 AB 2A 32 D1 E8 ED 18 41 16 86 06 B2 C8 44 o..*2....A.....D
- 0050: 61 56 57 EE B2 40 E1 B6 24 A5 4D 52 F7 FF AF 7B aVW..@..$.MR....
- 0060: 8A EE B1 D8 47 8A BD F8 E0 86 35 2D EC 8C 6F EE ....G.....5-..o.
- 0070: D3 F2 ED 58 83 B9 B3 69 31 8D 6A 0C 6B A9 8A E8 ...X...i1.j.k...
- 0080: 74 F4 AC 92 66 AF C2 55 FC 85 40 E6 5A 6B 44 B2 [email protected].
- 0090: CB A2 1F DE 0B EA CC B3 CE 08 3F B5 64 72 32 82 ..........?.dr2.
- 00A0: C4 8F 96 DB 3E 93 A1 05 E7 6C 04 45 18 C2 2C CD ....>....l.E..,.
- 00B0: BE 36 06 1B BD 7D 35 E8 A4 C2 00 2C 0E F2 B7 87 .6....5....,....
- 00C0: 10 2E BF 27 54 26 78 4E 2D 3F 6A 4F 2E 44 17 C0 ...'T&xN-?jO.D..
- 00D0: CE 3D 43 B1 CA 97 2F DF ED 0E D4 70 2F 4F F4 D5 .=C.../....p/O..
- 00E0: 36 AE 35 4E C5 2E 04 1A 6E 38 4D F6 67 33 26 7C 6.5N....n8M.g3&.
- 00F0: 09 9A 1A C9 57 35 90 97 7B B4 6A CC 82 E8 2F 4E ....W5....j.../N
- ]
- ***
- 09:48:57.439 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManager[] [[sun.security.ssl.SunX509KeyManagerImpl@63376bed]], initialized from KeyManagerFactory [javax.net.ssl.KeyManagerFactory@45099dd3].
- 09:48:57.440 [main] TRACE org.apache.camel.util.jsse.TrustManagersParameters - Creating TrustManager[] from TrustManagersParameters [TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null]]
- 09:48:57.451 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManagerFactory [javax.net.ssl.TrustManagerFactory@4145bad8] is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [PKIX].
- 09:48:57.452 [main] TRACE org.apache.camel.util.jsse.KeyStoreParameters - Creating KeyStore instance from KeyStoreParameters [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks, getContext()=null]].
- 09:48:57.452 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a file.
- 09:48:57.452 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a file.
- java.io.FileNotFoundException: file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks (No such file or directory)
- at java.io.FileInputStream.open0(Native Method) ~[?:1.8.0_91]
- at java.io.FileInputStream.open(FileInputStream.java:195) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:138) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:93) ~[?:1.8.0_91]
- at org.apache.camel.util.jsse.JsseParameters.resolveResource(JsseParameters.java:125) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyStoreParameters.createKeyStore(KeyStoreParameters.java:174) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.TrustManagersParameters.createTrustManagers(TrustManagersParameters.java:94) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.SSLContextParameters.createSSLContext(SSLContextParameters.java:257) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.component.ahc.AhcEndpoint.doStart(AhcEndpoint.java:251) [camel-ahc-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startService(DefaultCamelContext.java:3234) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doAddService(DefaultCamelContext.java:1209) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.addService(DefaultCamelContext.java:1170) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.addService(DefaultCamelContext.java:1166) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.getEndpoint(DefaultCamelContext.java:583) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.CamelContextHelper.getMandatoryEndpoint(CamelContextHelper.java:79) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.resolveEndpoint(RouteDefinition.java:211) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultRouteContext.resolveEndpoint(DefaultRouteContext.java:107) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultRouteContext.resolveEndpoint(DefaultRouteContext.java:113) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.SendDefinition.resolveEndpoint(SendDefinition.java:62) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.SendDefinition.createProcessor(SendDefinition.java:56) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.makeProcessorImpl(ProcessorDefinition.java:535) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.makeProcessor(ProcessorDefinition.java:496) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.ProcessorDefinition.addRoutes(ProcessorDefinition.java:220) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.addRoutes(RouteDefinition.java:1069) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.model.RouteDefinition.addRoutes(RouteDefinition.java:196) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startRoute(DefaultCamelContext.java:944) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startRouteDefinitions(DefaultCamelContext.java:3260) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartCamel(DefaultCamelContext.java:2983) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.access$000(DefaultCamelContext.java:175) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2814) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doWithDefinedClassLoader(DefaultCamelContext.java:2833) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStart(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.start(DefaultCamelContext.java:2779) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.startCamelContext(CamelTestSupport.java:544) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.doSetUp(CamelTestSupport.java:334) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.setUp(CamelTestSupport.java:238) [camel-test-2.16.3.jar:2.16.3]
- at de.tst.camel.test.both.WssProducerConsumerTest.setUp(WssProducerConsumerTest.java:97) [test-classes/:?]
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_91]
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_91]
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_91]
- at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_91]
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) [junit-4.12.jar:4.12]
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:24) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.RunRules.evaluate(RunRules.java:20) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.run(ParentRunner.java:363) [junit-4.12.jar:4.12]
- at org.eclipse.jdt.internal.junit4.runner.JUnit4TestReference.run(JUnit4TestReference.java:86) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.java:38) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:459) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:678) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRunner.java:382) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRunner.java:192) [.cp/:?]
- 09:48:57.456 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a class path resource with the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.456 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a class path resource using the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.456 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [sun.misc.Launcher$AppClassLoader@38af3868] as a class path resource using the classloader [{}].
- 09:48:57.456 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a class path resource using the classloader [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:57.456 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a URL.
- 09:48:57.457 [main] DEBUG org.apache.camel.util.jsse.JsseParameters - Opened resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks] as a URL.
- 09:48:57.457 [main] DEBUG org.apache.camel.util.jsse.KeyStoreParameters - KeyStore [java.security.KeyStore@d86a6f], initialized from [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks, getContext()=null]], is using provider [{Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [ca, subca].
- adding as trusted cert:
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- Algorithm: RSA; Serial number: 0xb325e3cb741b928f
- Valid from Tue Oct 25 09:36:19 CEST 2016 until Mon Oct 20 09:36:19 CEST 2036
- adding as trusted cert:
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Oct 25 09:36:19 CEST 2016 until Wed Oct 23 09:36:19 CEST 2024
- 09:48:57.460 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManager[] [[sun.security.ssl.X509TrustManagerImpl@3646a422]], initialized from TrustManagerFactory [javax.net.ssl.TrustManagerFactory@4145bad8].
- 09:48:57.590 [main] DEBUG org.apache.camel.util.jsse.SSLContextParameters - SSLContext [javax.net.ssl.SSLContext@909217e], initialized from [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/client-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}], protocol [TLS], key managers [sun.security.ssl.SunX509KeyManagerImpl@63376bed], trust managers [sun.security.ssl.X509TrustManagerImpl@3646a422], and secure random [null].
- trigger seeding of SecureRandom
- done seeding SecureRandom
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Overriding server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e] with configured server parameters.
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configured server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.602 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.603 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.615 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLEngine configurers with configurers from server parameters on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.616 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.618 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.632 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.632 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@909217e]...
- 09:48:57.634 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLServerSocketFactory configurers with configurers from server parameters for SSLContext [javax.net.ssl.SSLContext@909217e].
- 09:48:57.635 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@909217e].
- 2016-10-25 09:48:57,636 main ERROR Recursive call to appender Console
- 2016-10-25 09:48:57,824 main ERROR Recursive call to appender Console
- 2016-10-25 09:48:57,829 main ERROR Recursive call to appender Console
- 2016-10-25 09:48:57,830 main ERROR Recursive call to appender Console
- 09:48:57.635 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLContextDecorator [SSLContext[hash=7c37508a, provider=SunJSSE version 1.8, protocol=TLS, needClientAuth=false, wantClientAuth=false
- defaultProtocols=TLSv1,TLSv1.1,TLSv1.2
- defaultChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV
- supportedProtocols=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
- supportedChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV,TLS_DH_anon_WITH_AES_256_GCM_SHA384,TLS_DH_anon_WITH_AES_128_GCM_SHA256,TLS_DH_anon_WITH_AES_256_CBC_SHA256,TLS_ECDH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA256,TLS_ECDH_anon_WITH_AES_128_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA,TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA,SSL_DH_anon_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_DES_CBC_SHA,SSL_DHE_RSA_WITH_DES_CBC_SHA,SSL_DHE_DSS_WITH_DES_CBC_SHA,SSL_DH_anon_WITH_DES_CBC_SHA,SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA,SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_NULL_SHA,TLS_ECDHE_RSA_WITH_NULL_SHA,SSL_RSA_WITH_NULL_SHA,TLS_ECDH_ECDSA_WITH_NULL_SHA,TLS_ECDH_RSA_WITH_NULL_SHA,TLS_ECDH_anon_WITH_NULL_SHA,SSL_RSA_WITH_NULL_MD5,TLS_KRB5_WITH_3DES_EDE_CBC_SHA,TLS_KRB5_WITH_3DES_EDE_CBC_MD5,TLS_KRB5_WITH_DES_CBC_SHA,TLS_KRB5_WITH_DES_CBC_MD5,TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA,TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
- ]] decorating SSLContext [javax.net.ssl.SSLContext@909217e].
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- 09:48:57.938 [main] TRACE com.ning.http.client.providers.netty.channel.ChannelManager - Number of application's worker threads is 4
- 09:48:58.006 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'To[testclient://localhost:9292/echo]'
- 09:48:58.006 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.008 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.009 [main] TRACE org.apache.camel.model.ToDefinition - To[testclient://localhost:9292/echo] is configured to inheritErrorHandler
- 09:48:58.010 [main] TRACE org.apache.camel.model.ToDefinition - To[testclient://localhost:9292/echo] wrapped in Channel: Channel[sendTo(Endpoint[testclient://localhost:9292/echo])]
- 09:48:58.011 [main] TRACE org.apache.camel.model.ToDefinition - Adding event driven processor: Channel[sendTo(Endpoint[testclient://localhost:9292/echo])]
- 09:48:58.011 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: Log[>>> Message from WebSocket Client to server: ${body}]
- 09:48:58.012 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from WebSocket Client to server: ${body}]
- 09:48:58.012 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving known fields for: Log[>>> Message from WebSocket Client to server: ${body}]
- 09:48:58.013 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from WebSocket Client to server: ${body}]
- 09:48:58.023 [main] DEBUG org.apache.camel.model.LogDefinition - The LogName is null. Falling back to create logger by using the route id foo.
- 09:48:58.023 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'Log[>>> Message from WebSocket Client to server: ${body}]'
- 09:48:58.023 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.024 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.024 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from WebSocket Client to server: ${body}] is configured to inheritErrorHandler
- 09:48:58.024 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from WebSocket Client to server: ${body}] wrapped in Channel: Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]
- 09:48:58.025 [main] TRACE org.apache.camel.model.LogDefinition - Adding event driven processor: Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]
- 09:48:58.034 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: testserver:localhost:9292/echo
- 09:48:58.035 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: testserver:localhost:9292/echo, normalized uri: testserver://localhost:9292/echo
- 09:48:58.035 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Endpoint uri: testserver://localhost:9292/echo is from component with name: testserver
- 09:48:58.036 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(testserver) -> de.tst.camel.test.server.WebsocketComponent@37f1104d
- 09:48:58.036 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Creating endpoint from uri: testserver://localhost:9292/echo using component: de.tst.camel.test.server.WebsocketComponent@37f1104d
- 09:48:58.036 [main] TRACE org.apache.camel.impl.DefaultComponent - Creating endpoint uri=[testserver://localhost:9292/echo], path=[localhost:9292/echo], parameters=[{}]
- 09:48:58.037 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - testserver://localhost:9292/echo converted to endpoint: Endpoint[testserver://localhost:9292/echo] by component: de.tst.camel.test.server.WebsocketComponent@37f1104d
- 09:48:58.037 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.037 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: Log[>>> Message from WebSocket Server to mock: ${body}]
- 09:48:58.038 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from WebSocket Server to mock: ${body}]
- 09:48:58.038 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving known fields for: Log[>>> Message from WebSocket Server to mock: ${body}]
- 09:48:58.038 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 12 properties on: Log[>>> Message from WebSocket Server to mock: ${body}]
- 09:48:58.041 [main] DEBUG org.apache.camel.model.LogDefinition - The LogName is null. Falling back to create logger by using the route id route1.
- 09:48:58.041 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'Log[>>> Message from WebSocket Server to mock: ${body}]'
- 09:48:58.042 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.047 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.047 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from WebSocket Server to mock: ${body}] is configured to inheritErrorHandler
- 09:48:58.048 [main] TRACE org.apache.camel.model.LogDefinition - Log[>>> Message from WebSocket Server to mock: ${body}] wrapped in Channel: Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]]
- 09:48:58.052 [main] TRACE org.apache.camel.model.LogDefinition - Adding event driven processor: Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]]
- 09:48:58.052 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving property placeholders for: To[mock:result]
- 09:48:58.061 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 10 properties on: To[mock:result]
- 09:48:58.061 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - Resolving known fields for: To[mock:result]
- 09:48:58.069 [main] TRACE org.apache.camel.model.ProcessorDefinitionHelper - There are 10 properties on: To[mock:result]
- 09:48:58.069 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: mock:result
- 09:48:58.069 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: mock:result, normalized uri: mock://result
- 09:48:58.069 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Endpoint uri: mock://result is from component with name: mock
- 09:48:58.070 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Using ComponentResolver: org.apache.camel.impl.DefaultComponentResolver@7b2bbc3 to resolve component with name: mock
- 09:48:58.070 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: mock in registry: null
- 09:48:58.070 [main] TRACE org.apache.camel.util.ObjectHelper - Loading class: org.apache.camel.component.mock.MockComponent using classloader: sun.misc.Launcher$AppClassLoader@38af3868
- 09:48:58.071 [main] DEBUG org.apache.camel.impl.DefaultComponentResolver - Found component: mock via type: org.apache.camel.component.mock.MockComponent via: META-INF/services/org/apache/camel/component/mock
- 09:48:58.071 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing before initialization for bean: org.apache.camel.component.mock.MockComponent
- 09:48:58.071 [main] TRACE org.apache.camel.impl.DefaultCamelBeanPostProcessor - Camel bean processing after initialization for bean: org.apache.camel.component.mock.MockComponent
- 09:48:58.071 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.071 [main] TRACE org.apache.camel.impl.DefaultCamelContext - getComponent(mock) -> org.apache.camel.component.mock.MockComponent@56dc1551
- 09:48:58.072 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Creating endpoint from uri: mock://result using component: org.apache.camel.component.mock.MockComponent@56dc1551
- 09:48:58.072 [main] TRACE org.apache.camel.impl.DefaultComponent - Creating endpoint uri=[mock://result], path=[result], parameters=[{}]
- 09:48:58.087 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - mock://result converted to endpoint: Endpoint[mock://result] by component: org.apache.camel.component.mock.MockComponent@56dc1551
- 09:48:58.088 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.089 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'To[mock:result]'
- 09:48:58.090 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.090 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.090 [main] TRACE org.apache.camel.model.ToDefinition - To[mock:result] is configured to inheritErrorHandler
- 09:48:58.090 [main] TRACE org.apache.camel.model.ToDefinition - To[mock:result] wrapped in Channel: Channel[sendTo(Endpoint[mock://result])]
- 09:48:58.090 [main] TRACE org.apache.camel.model.ToDefinition - Adding event driven processor: Channel[sendTo(Endpoint[mock://result])]
- 09:48:58.091 [main] INFO org.apache.camel.impl.DefaultCamelContext - AllowUseOriginalMessage is enabled. If access to the original message is not needed, then its recommended to turn this option off as it may improve performance.
- 09:48:58.091 [main] INFO org.apache.camel.impl.DefaultCamelContext - StreamCaching is not in use. If using streams then its recommended to enable stream caching. See more details at http://camel.apache.org/stream-caching.html
- 09:48:58.096 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Warming up route id: foo having autoStartup=true
- 09:48:58.096 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.096 [main] DEBUG org.apache.camel.impl.RouteService - Starting services on route: foo
- 09:48:58.100 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Pipeline[[Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]], Channel[sendTo(Endpoint[testclient://localhost:9292/echo])], Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]]]
- 09:48:58.103 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.103 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.104 [main] DEBUG org.apache.camel.processor.DefaultErrorHandler - Redelivery enabled: false on error handler: DefaultErrorHandler[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]]
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.104 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.105 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.105 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.106 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.106 [main] TRACE org.apache.camel.impl.SharedProducerServicePool - No free services in pool to acquire for key: Endpoint[testclient://localhost:9292/echo]
- 09:48:58.108 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.108 [main] DEBUG de.tst.camel.test.client.WsProducer - Starting producer: Producer[testclient://localhost:9292/echo]
- 09:48:58.109 [main] DEBUG org.apache.camel.impl.ProducerCache - Adding to producer cache with key: Endpoint[testclient://localhost:9292/echo] for producer: Producer[testclient://localhost:9292/echo]
- 09:48:58.109 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.109 [main] DEBUG org.apache.camel.processor.DefaultErrorHandler - Redelivery enabled: false on error handler: DefaultErrorHandler[sendTo(Endpoint[testclient://localhost:9292/echo])]
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.111 [main] DEBUG org.apache.camel.processor.DefaultErrorHandler - Redelivery enabled: false on error handler: DefaultErrorHandler[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.111 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Pipeline[[Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]], Channel[sendTo(Endpoint[testclient://localhost:9292/echo])], Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]]]
- 09:48:58.111 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.111 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Log(foo)[>>> Message from direct to WebSocket Client : ${body}]
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]]
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> sendTo(Endpoint[testclient://localhost:9292/echo])
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Channel[sendTo(Endpoint[testclient://localhost:9292/echo])]
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Log(foo)[>>> Message from WebSocket Client to server: ${body}]
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: foo -> Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Warming up route id: route1 having autoStartup=true
- 09:48:58.112 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.112 [main] DEBUG org.apache.camel.impl.RouteService - Starting services on route: route1
- 09:48:58.113 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> Pipeline[[Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]], Channel[sendTo(Endpoint[mock://result])]]]
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.114 [main] DEBUG org.apache.camel.processor.DefaultErrorHandler - Redelivery enabled: false on error handler: DefaultErrorHandler[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]]
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.114 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.114 [main] TRACE org.apache.camel.impl.SharedProducerServicePool - No free services in pool to acquire for key: Endpoint[mock://result]
- 09:48:58.117 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.117 [main] DEBUG org.apache.camel.component.mock.MockEndpoint$1 - Starting producer: Producer[mock://result]
- 09:48:58.117 [main] DEBUG org.apache.camel.impl.ProducerCache - Adding to producer cache with key: Endpoint[mock://result] for producer: Producer[mock://result]
- 09:48:58.117 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.117 [main] DEBUG org.apache.camel.processor.DefaultErrorHandler - Redelivery enabled: false on error handler: DefaultErrorHandler[sendTo(Endpoint[mock://result])]
- 09:48:58.117 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.117 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> Pipeline[[Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]], Channel[sendTo(Endpoint[mock://result])]]]
- 09:48:58.118 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.118 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> Log(route1)[>>> Message from WebSocket Server to mock: ${body}]
- 09:48:58.118 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.118 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]]
- 09:48:58.118 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.118 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> sendTo(Endpoint[mock://result])
- 09:48:58.118 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.118 [main] DEBUG org.apache.camel.impl.RouteService - Starting child service on route: route1 -> Channel[sendTo(Endpoint[mock://result])]
- 09:48:58.118 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.119 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Route: foo >>> EventDrivenConsumerRoute[Endpoint[direct://input] -> Pipeline[[Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]], Channel[sendTo(Endpoint[testclient://localhost:9292/echo])], Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]]]]
- 09:48:58.119 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Starting consumer (order: 1000) on route: foo
- 09:48:58.119 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.119 [main] INFO org.apache.camel.impl.DefaultCamelContext - Route: foo started and consuming from: Endpoint[direct://input]
- 09:48:58.119 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.119 [main] TRACE org.apache.camel.util.EventHelper - Notifier: org.apache.camel.impl.DefaultRuntimeEndpointRegistry@64e7619d is not enabled for the event: Started route: foo
- 09:48:58.119 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Route: route1 >>> EventDrivenConsumerRoute[Endpoint[testserver://localhost:9292/echo] -> Pipeline[[Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]], Channel[sendTo(Endpoint[mock://result])]]]]
- 09:48:58.119 [main] DEBUG org.apache.camel.impl.DefaultCamelContext - Starting consumer (order: 1001) on route: route1
- 09:48:58.119 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.119 [main] DEBUG de.tst.camel.test.server.WebsocketConsumer - Starting consumer: Consumer[testserver://localhost:9292/echo]
- 09:48:58.120 [main] TRACE org.apache.camel.support.ServiceSupport - Service already started
- 09:48:58.120 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting CamelJettyWebSocketServer{STOPPED,1<=0<=5,i=0,q=0}
- 09:48:58.120 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4512ms CamelJettyWebSocketServer{STARTED,1<=1<=5,i=0,q=0}
- 09:48:58.121 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@6ea2bc93 added {CamelJettyWebSocketServer{STARTED,1<=1<=5,i=0,q=0},UNMANAGED}
- 09:48:58.122 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@6ea2bc93 added {org.eclipse.jetty.server.handler.ContextHandlerCollection@3224a577[],AUTO}
- 09:48:58.130 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Creating SSLContext from SSLContextParameters [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=CamelContext(camel-1)]].
- 09:48:58.130 [main] INFO org.apache.camel.util.jsse.SSLContextParameters - Available providers: {Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}.
- 09:48:58.131 [main] TRACE org.apache.camel.util.jsse.KeyManagersParameters - Creating KeyManager[] from KeyManagersParameters [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]].
- 09:48:58.131 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManagerFactory [javax.net.ssl.KeyManagerFactory@3e44f2a5], initialized from [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [SunX509].
- 09:48:58.131 [main] TRACE org.apache.camel.util.jsse.KeyStoreParameters - Creating KeyStore instance from KeyStoreParameters [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null]].
- 09:48:58.131 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a file.
- 09:48:58.131 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a file.
- java.io.FileNotFoundException: file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks (No such file or directory)
- at java.io.FileInputStream.open0(Native Method) ~[?:1.8.0_91]
- at java.io.FileInputStream.open(FileInputStream.java:195) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:138) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:93) ~[?:1.8.0_91]
- at org.apache.camel.util.jsse.JsseParameters.resolveResource(JsseParameters.java:125) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyStoreParameters.createKeyStore(KeyStoreParameters.java:174) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyManagersParameters.createKeyManagers(KeyManagersParameters.java:108) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.SSLContextParameters.createSSLContext(SSLContextParameters.java:256) [camel-core-2.16.3.jar:2.16.3]
- at de.tst.camel.test.server.WebsocketComponent.getSslSocketConnector(WebsocketComponent.java:498) [classes/:?]
- at de.tst.camel.test.server.WebsocketComponent.connect(WebsocketComponent.java:144) [classes/:?]
- at de.tst.camel.test.server.WebsocketEndpoint.connect(WebsocketEndpoint.java:113) [classes/:?]
- at de.tst.camel.test.server.WebsocketConsumer.doStart(WebsocketConsumer.java:36) [classes/:?]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startService(DefaultCamelContext.java:3234) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartOrResumeRouteConsumers(DefaultCamelContext.java:3528) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartRouteConsumers(DefaultCamelContext.java:3464) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.safelyStartRouteServices(DefaultCamelContext.java:3394) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartOrResumeRoutes(DefaultCamelContext.java:3162) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartCamel(DefaultCamelContext.java:3018) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.access$000(DefaultCamelContext.java:175) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2814) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doWithDefinedClassLoader(DefaultCamelContext.java:2833) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStart(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.start(DefaultCamelContext.java:2779) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.startCamelContext(CamelTestSupport.java:544) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.doSetUp(CamelTestSupport.java:334) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.setUp(CamelTestSupport.java:238) [camel-test-2.16.3.jar:2.16.3]
- at de.tst.camel.test.both.WssProducerConsumerTest.setUp(WssProducerConsumerTest.java:97) [test-classes/:?]
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_91]
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_91]
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_91]
- at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_91]
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) [junit-4.12.jar:4.12]
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:24) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.RunRules.evaluate(RunRules.java:20) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.run(ParentRunner.java:363) [junit-4.12.jar:4.12]
- at org.eclipse.jdt.internal.junit4.runner.JUnit4TestReference.run(JUnit4TestReference.java:86) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.java:38) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:459) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:678) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRunner.java:382) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRunner.java:192) [.cp/:?]
- 09:48:58.132 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a class path resource with the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.132 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a class path resource using the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.134 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [sun.misc.Launcher$AppClassLoader@38af3868] as a class path resource using the classloader [{}].
- 09:48:58.135 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a class path resource using the classloader [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.136 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a URL.
- 09:48:58.136 [main] DEBUG org.apache.camel.util.jsse.JsseParameters - Opened resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks] as a URL.
- 09:48:58.140 [main] DEBUG org.apache.camel.util.jsse.KeyStoreParameters - KeyStore [java.security.KeyStore@295cf707], initialized from [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null]], is using provider [{Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [server].
- ***
- found key for : server
- chain [0] = [
- [
- Version: V3
- Subject: CN=Test Server, OU=MyDepartment, O=MyCompany, L=Munich, ST=Bavaria, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 19697468346206325338625931027401620685505412743602335229201285324147237256216294710834287613270808792700765169197171367371459991031662084309764776191914171160104989266207613238184784158415975037177065022201531172433794931849866898549526682368884371139417838799836320672154199909478730633522432282118939559532307066108447566990979134741165253612506513491626459651819946324249745973578011579650517987718802720162457248935339641095429277723082345377268006775487733517858798408645354401260091015110745708667097965877142342305591846833532604648462225727819942287641383438004739414038605341137460966856052237012367021734999
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:37:42 CEST 2016,
- To: Thu Oct 25 09:37:42 CEST 2018]
- Issuer: CN=Test SubCA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 6
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [3]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [4]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [5]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- ]
- [6]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 7F 45 12 3E F5 17 F8 EF FF 2F 08 46 25 4B 21 60 .E.>...../.F%K!`
- 0010: EB FC 1B 4F ...O
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 1E 7F 87 DF 07 84 86 AC 03 B3 3A 11 F4 D1 18 56 ..........:....V
- 0010: C2 77 73 73 54 A8 F4 6C 4F 7F 8D 6C DA 68 16 0D .wssT..lO..l.h..
- 0020: 43 78 DE 52 7C BF 47 55 0C 3B BF B2 BC 95 61 51 Cx.R..GU.;....aQ
- 0030: 0F A0 EE 3A 9D 0C 4D B4 ED AC 24 A5 87 6A B6 7E ...:..M...$..j..
- 0040: FB CD 44 A4 54 6B CA 48 66 27 6B 85 99 33 38 AF ..D.Tk.Hf'k..38.
- 0050: FF B5 04 8C D2 FD 7F CF BA 26 B0 52 58 F8 69 C0 .........&.RX.i.
- 0060: 0A C2 94 CA EA 34 F2 65 4D 88 5E 96 16 85 61 AC .....4.eM.^...a.
- 0070: 6A 9A B9 D8 6F 4A 34 5B C8 A1 D6 CA 90 B8 1A D9 j...oJ4[........
- 0080: 9B DF E3 C3 63 19 83 93 E7 C2 63 FE A5 74 EF 56 ....c.....c..t.V
- 0090: DD 9C 85 E8 5E CF 8A 5B C1 EB 22 F7 61 CB 69 54 ....^..[..".a.iT
- 00A0: 45 77 70 94 02 D5 92 23 37 14 21 17 3D E5 E4 FE Ewp....#7.!.=...
- 00B0: 1B 89 7D DE 9B 86 14 C1 77 54 C7 D9 59 9A E3 B6 ........wT..Y...
- 00C0: 27 C3 B7 94 FE 6B 3E 09 9E 79 7B 94 D3 5A 89 88 '....k>..y...Z..
- 00D0: AE C4 F9 C2 9A 29 FF 7C C3 E3 39 97 19 AA 4C E6 .....)....9...L.
- 00E0: 11 0A F8 C4 AC 86 42 77 09 54 2E F3 6B 25 65 16 ......Bw.T..k%e.
- 00F0: DC B8 E0 C7 E9 E4 BE 7D AC FE 63 BB AD 4F 9E 28 ..........c..O.(
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 26631545169559909230644768517141423752587936995376103841916319711589604204657412965085012857613884736340404856156055730865366293452487088032192693197115272441309759692119853059588457702024310176286735623930806732223217746707553162920026328869975003955119995376544166185370171169754372937503191991895430322266330639043068107814272353729016677147704110258330738274123675092182231270336660156341013822146156531604782194936726777505454634586992024194343729864238470993219746161883279675292359116443207963682462389190768365005135861009362967140179446538991559245820502973316731788494182116238178045967298158538348480713037
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Wed Oct 23 09:36:19 CEST 2024]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 91 86 4A DF ED 72 4C 30 E0 86 D2 12 BC 82 DB 73 ..J..rL0.......s
- 0010: 73 A7 DC 1A 51 B7 68 9B 1F 20 58 A3 6D 5F 53 6F s...Q.h.. X.m_So
- 0020: 42 12 D5 C1 5C 82 D1 E8 CA 47 61 45 A7 BD B3 60 B...\....GaE...`
- 0030: 92 01 0C 90 08 C3 15 FE E8 9F EF 85 C0 13 38 25 ..............8%
- 0040: 9B 5A 71 D8 3F 2D 0C 06 FC A3 EC 7E 99 88 4F 77 .Zq.?-........Ow
- 0050: 95 8A 44 63 48 9D 3A 30 22 54 73 25 96 66 1F 23 ..DcH.:0"Ts%.f.#
- 0060: 17 A8 D6 A5 F3 59 2F 41 87 DE 34 7F 12 98 BA AD .....Y/A..4.....
- 0070: 6F ED B8 B6 6E 2C C2 0C E7 78 39 E4 63 58 90 83 o...n,...x9.cX..
- 0080: 2B C7 EA DF 27 61 BA 57 9D D9 82 51 F0 0D 00 5E +...'a.W...Q...^
- 0090: BA 03 32 9D 51 A2 69 D4 A7 A3 5B 17 9D 3F F0 0E ..2.Q.i...[..?..
- 00A0: E7 4B CD 3E 6C 83 D4 3A 2C FE 33 9A E3 F3 2C CA .K.>l..:,.3...,.
- 00B0: EE 6A 12 01 54 73 C0 7E 69 A1 21 CA 5E 1D FB 0F .j..Ts..i.!.^...
- 00C0: E2 1B 46 4E 9F E3 4F DD BD 86 F3 8A E4 BA 68 F1 ..FN..O.......h.
- 00D0: 30 E7 A7 1B CA A7 90 68 0C 0A 51 62 40 8E 5D 77 0......h..Qb@.]w
- 00E0: 47 2F 1D F3 6D 6A 5D C8 52 D8 30 D7 A4 E3 C0 6F G/..mj].R.0....o
- 00F0: EA B2 75 99 88 31 4E 35 96 FF 20 FA AD 15 24 6B ..u..1N5.. ...$k
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
- Key: Sun RSA public key, 2048 bits
- modulus: 21614797379343951874063560426666435817765804479254937174344617783446070293504573872083026160705569565210812742004667604650861924545507924869082180535728855063107699051629520028088509890238676139784840816403038623216715215937709028135784989878225131123560489367685617129784581943689922756036136019263207604359599950402845747582709049931050550113248498210094031108669553570309004666029329989061171507007407888466064368567345515996525419672802677026087475471995473656928759075978348832385752404966781376484507135996003989017552715979352721517675529496859338972037423806416908469445902511278769181221473628003736339491043
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Mon Oct 20 09:36:19 CEST 2036]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ b325e3cb 741b928f]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- Non_repudiation
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- ]
- Algorithm: [SHA1withRSA]
- Signature:
- 0000: 47 FE 9A A4 A6 2D DC 77 09 5E 87 FB 7D 7E 15 10 G....-.w.^......
- 0010: 51 07 70 DC 3B D8 5C B8 07 0B 77 7C A6 AF 35 7A Q.p.;.\...w...5z
- 0020: 0D 02 03 6B 17 0F 0D 47 A2 22 68 CA C7 50 7E D4 ...k...G."h..P..
- 0030: C3 2A 52 56 85 E4 50 1E 45 94 2E C2 2B 20 8B AC .*RV..P.E...+ ..
- 0040: 6F F5 AB 2A 32 D1 E8 ED 18 41 16 86 06 B2 C8 44 o..*2....A.....D
- 0050: 61 56 57 EE B2 40 E1 B6 24 A5 4D 52 F7 FF AF 7B aVW..@..$.MR....
- 0060: 8A EE B1 D8 47 8A BD F8 E0 86 35 2D EC 8C 6F EE ....G.....5-..o.
- 0070: D3 F2 ED 58 83 B9 B3 69 31 8D 6A 0C 6B A9 8A E8 ...X...i1.j.k...
- 0080: 74 F4 AC 92 66 AF C2 55 FC 85 40 E6 5A 6B 44 B2 [email protected].
- 0090: CB A2 1F DE 0B EA CC B3 CE 08 3F B5 64 72 32 82 ..........?.dr2.
- 00A0: C4 8F 96 DB 3E 93 A1 05 E7 6C 04 45 18 C2 2C CD ....>....l.E..,.
- 00B0: BE 36 06 1B BD 7D 35 E8 A4 C2 00 2C 0E F2 B7 87 .6....5....,....
- 00C0: 10 2E BF 27 54 26 78 4E 2D 3F 6A 4F 2E 44 17 C0 ...'T&xN-?jO.D..
- 00D0: CE 3D 43 B1 CA 97 2F DF ED 0E D4 70 2F 4F F4 D5 .=C.../....p/O..
- 00E0: 36 AE 35 4E C5 2E 04 1A 6E 38 4D F6 67 33 26 7C 6.5N....n8M.g3&.
- 00F0: 09 9A 1A C9 57 35 90 97 7B B4 6A CC 82 E8 2F 4E ....W5....j.../N
- ]
- ***
- 09:48:58.161 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManager[] [[sun.security.ssl.SunX509KeyManagerImpl@463fd068]], initialized from KeyManagerFactory [javax.net.ssl.KeyManagerFactory@3e44f2a5].
- 09:48:58.161 [main] TRACE org.apache.camel.util.jsse.TrustManagersParameters - Creating TrustManager[] from TrustManagersParameters [TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null]]
- 09:48:58.162 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManagerFactory [javax.net.ssl.TrustManagerFactory@895e367] is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [PKIX].
- 09:48:58.162 [main] TRACE org.apache.camel.util.jsse.KeyStoreParameters - Creating KeyStore instance from KeyStoreParameters [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks, getContext()=null]].
- 09:48:58.163 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a file.
- 09:48:58.163 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a file.
- java.io.FileNotFoundException: file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks (No such file or directory)
- at java.io.FileInputStream.open0(Native Method) ~[?:1.8.0_91]
- at java.io.FileInputStream.open(FileInputStream.java:195) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:138) ~[?:1.8.0_91]
- at java.io.FileInputStream.<init>(FileInputStream.java:93) ~[?:1.8.0_91]
- at org.apache.camel.util.jsse.JsseParameters.resolveResource(JsseParameters.java:125) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.KeyStoreParameters.createKeyStore(KeyStoreParameters.java:174) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.TrustManagersParameters.createTrustManagers(TrustManagersParameters.java:94) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.util.jsse.SSLContextParameters.createSSLContext(SSLContextParameters.java:257) [camel-core-2.16.3.jar:2.16.3]
- at de.tst.camel.test.server.WebsocketComponent.getSslSocketConnector(WebsocketComponent.java:498) [classes/:?]
- at de.tst.camel.test.server.WebsocketComponent.connect(WebsocketComponent.java:144) [classes/:?]
- at de.tst.camel.test.server.WebsocketEndpoint.connect(WebsocketEndpoint.java:113) [classes/:?]
- at de.tst.camel.test.server.WebsocketConsumer.doStart(WebsocketConsumer.java:36) [classes/:?]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.startService(DefaultCamelContext.java:3234) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartOrResumeRouteConsumers(DefaultCamelContext.java:3528) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartRouteConsumers(DefaultCamelContext.java:3464) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.safelyStartRouteServices(DefaultCamelContext.java:3394) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartOrResumeRoutes(DefaultCamelContext.java:3162) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStartCamel(DefaultCamelContext.java:3018) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.access$000(DefaultCamelContext.java:175) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2814) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext$2.call(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doWithDefinedClassLoader(DefaultCamelContext.java:2833) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.doStart(DefaultCamelContext.java:2810) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.support.ServiceSupport.start(ServiceSupport.java:61) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.impl.DefaultCamelContext.start(DefaultCamelContext.java:2779) [camel-core-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.startCamelContext(CamelTestSupport.java:544) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.doSetUp(CamelTestSupport.java:334) [camel-test-2.16.3.jar:2.16.3]
- at org.apache.camel.test.junit4.CamelTestSupport.setUp(CamelTestSupport.java:238) [camel-test-2.16.3.jar:2.16.3]
- at de.tst.camel.test.both.WssProducerConsumerTest.setUp(WssProducerConsumerTest.java:97) [test-classes/:?]
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_91]
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_91]
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_91]
- at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_91]
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) [junit-4.12.jar:4.12]
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:24) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:55) [junit-4.12.jar:4.12]
- at org.junit.rules.RunRules.evaluate(RunRules.java:20) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) [junit-4.12.jar:4.12]
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) [junit-4.12.jar:4.12]
- at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) [junit-4.12.jar:4.12]
- at org.junit.runners.ParentRunner.run(ParentRunner.java:363) [junit-4.12.jar:4.12]
- at org.eclipse.jdt.internal.junit4.runner.JUnit4TestReference.run(JUnit4TestReference.java:86) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.java:38) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:459) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTestRunner.java:678) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRunner.java:382) [.cp/:?]
- at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRunner.java:192) [.cp/:?]
- 09:48:58.165 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a class path resource with the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.166 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a class path resource using the TCCL [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.166 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [sun.misc.Launcher$AppClassLoader@38af3868] as a class path resource using the classloader [{}].
- 09:48:58.166 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Could not open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a class path resource using the classloader [sun.misc.Launcher$AppClassLoader@38af3868].
- 09:48:58.166 [main] TRACE org.apache.camel.util.jsse.JsseParameters - Trying to open resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a URL.
- 09:48:58.166 [main] DEBUG org.apache.camel.util.jsse.JsseParameters - Opened resource [file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks] as a URL.
- 09:48:58.168 [main] DEBUG org.apache.camel.util.jsse.KeyStoreParameters - KeyStore [java.security.KeyStore@1b266842], initialized from [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks, getContext()=null]], is using provider [{Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [ca, subca].
- adding as trusted cert:
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- Algorithm: RSA; Serial number: 0xb325e3cb741b928f
- Valid from Tue Oct 25 09:36:19 CEST 2016 until Mon Oct 20 09:36:19 CEST 2036
- adding as trusted cert:
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Oct 25 09:36:19 CEST 2016 until Wed Oct 23 09:36:19 CEST 2024
- 09:48:58.169 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManager[] [[sun.security.ssl.X509TrustManagerImpl@651aed93]], initialized from TrustManagerFactory [javax.net.ssl.TrustManagerFactory@895e367].
- 09:48:58.169 [main] DEBUG org.apache.camel.util.jsse.SSLContextParameters - SSLContext [javax.net.ssl.SSLContext@4dd6fd0a], initialized from [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/gbrost/GIT/karaf-policy-platform/camel-test/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=CamelContext(camel-1)]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}], protocol [TLS], key managers [sun.security.ssl.SunX509KeyManagerImpl@463fd068], trust managers [sun.security.ssl.X509TrustManagerImpl@651aed93], and secure random [null].
- trigger seeding of SecureRandom
- done seeding SecureRandom
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Overriding server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a] with configured server parameters.
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.170 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configured server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.172 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.175 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.175 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLEngine configurers with configurers from server parameters on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.176 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.176 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.176 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.177 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@4dd6fd0a]...
- 09:48:58.177 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLServerSocketFactory configurers with configurers from server parameters for SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.178 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.178 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLContextDecorator [SSLContext[hash=bb9e6dc, provider=SunJSSE version 1.8, protocol=TLS, needClientAuth=false, wantClientAuth=false
- defaultProtocols=TLSv1,TLSv1.1,TLSv1.2
- defaultChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV
- supportedProtocols=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
- supportedChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV,TLS_DH_anon_WITH_AES_256_GCM_SHA384,TLS_DH_anon_WITH_AES_128_GCM_SHA256,TLS_DH_anon_WITH_AES_256_CBC_SHA256,TLS_ECDH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA256,TLS_ECDH_anon_WITH_AES_128_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA,TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA,SSL_DH_anon_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_DES_CBC_SHA,SSL_DHE_RSA_WITH_DES_CBC_SHA,SSL_DHE_DSS_WITH_DES_CBC_SHA,SSL_DH_anon_WITH_DES_CBC_SHA,SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA,SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_NULL_SHA,TLS_ECDHE_RSA_WITH_NULL_SHA,SSL_RSA_WITH_NULL_SHA,TLS_ECDH_ECDSA_WITH_NULL_SHA,TLS_ECDH_RSA_WITH_NULL_SHA,TLS_ECDH_anon_WITH_NULL_SHA,SSL_RSA_WITH_NULL_MD5,TLS_KRB5_WITH_3DES_EDE_CBC_SHA,TLS_KRB5_WITH_3DES_EDE_CBC_MD5,TLS_KRB5_WITH_DES_CBC_SHA,TLS_KRB5_WITH_DES_CBC_MD5,TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA,TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
- ]] decorating SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.203 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - HttpConnectionFactory@589da3f3{HTTP/1.1} added {HttpConfiguration@39d76cb5{32768/8192,8192/8192,https://:0,[]},POJO}
- 09:48:58.209 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - SslConnectionFactory@4bd31064{SSL-HTTP/1.1} added {WebSocketComponentSslContextFactory@e3c0e40(null,null),AUTO}
- 09:48:58.210 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{null}{0.0.0.0:0} added {org.eclipse.jetty.server.Server@6ea2bc93,UNMANAGED}
- 09:48:58.210 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{null}{0.0.0.0:0} added {CamelJettyWebSocketServer{STARTED,1<=1<=5,i=1,q=0},UNMANAGED}
- 09:48:58.210 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{null}{0.0.0.0:0} added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@329dbdbf,AUTO}
- 09:48:58.211 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{null}{0.0.0.0:0} added {org.eclipse.jetty.io.ArrayByteBufferPool@20d7d6fb,POJO}
- 09:48:58.211 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{null}{0.0.0.0:0} added {SslConnectionFactory@4bd31064{SSL-HTTP/1.1},AUTO}
- 09:48:58.211 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{SSL-HTTP/1.1}{0.0.0.0:0} added {HttpConnectionFactory@589da3f3{HTTP/1.1},AUTO}
- 09:48:58.211 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{SSL-HTTP/1.1}{0.0.0.0:0} added {org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@4ef782af,MANAGED}
- 09:48:58.215 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@6ea2bc93 added {ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292},AUTO}
- 09:48:58.215 [main] TRACE de.tst.camel.test.server.WebsocketComponent - Jetty Connector added: null
- 09:48:58.216 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@6ea2bc93 added {o.e.j.s.ServletContextHandler@11d8ae8b{/,null,null},AUTO}
- 09:48:58.219 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - o.e.j.s.ServletContextHandler@11d8ae8b{/,null,null} added {org.eclipse.jetty.servlet.ServletHandler@479cbee5,AUTO}
- 09:48:58.221 [main] INFO de.tst.camel.test.server.WebsocketComponent - Jetty Server starting on host: localhost:9292
- 09:48:58.221 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.Server@6ea2bc93
- 09:48:58.226 [main] INFO org.eclipse.jetty.server.Server - jetty-9.2.15.v20160210
- 09:48:58.226 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting org.eclipse.jetty.server.Server@6ea2bc93
- 09:48:58.226 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting o.e.j.s.ServletContextHandler@11d8ae8b{/,null,null}
- 09:48:58.226 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting o.e.j.s.ServletContextHandler@11d8ae8b{/,null,STARTING}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.servlet.ServletHandler@479cbee5
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap=null
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Adding Default404Servlet to org.eclipse.jetty.servlet.ServletHandler@479cbee5
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@479cbee5 added {org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false,AUTO}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@479cbee5 added {[/]=>org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3,POJO}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/ mapped to servlet=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3 from default=false
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 09:48:58.227 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 09:48:58.228 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap={/=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 09:48:58.228 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 09:48:58.228 [main] DEBUG org.eclipse.jetty.server.handler.AbstractHandler - starting org.eclipse.jetty.servlet.ServletHandler@479cbee5
- 09:48:58.228 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4620ms org.eclipse.jetty.servlet.ServletHandler@479cbee5
- 09:48:58.229 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false
- 09:48:58.229 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4620ms org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false
- 09:48:58.229 [main] INFO org.eclipse.jetty.server.handler.ContextHandler - Started o.e.j.s.ServletContextHandler@11d8ae8b{/,null,AVAILABLE}
- 09:48:58.229 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4621ms o.e.j.s.ServletContextHandler@11d8ae8b{/,null,AVAILABLE}
- 09:48:58.229 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292}
- 09:48:58.230 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292} added {sun.nio.ch.ServerSocketChannelImpl[/127.0.0.1:9292],POJO}
- 09:48:58.230 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@329dbdbf
- 09:48:58.230 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4622ms org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@329dbdbf
- 09:48:58.230 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting SslConnectionFactory@4bd31064{SSL-HTTP/1.1}
- 09:48:58.231 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting WebSocketComponentSslContextFactory@e3c0e40(null,null)
- 09:48:58.231 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4622ms WebSocketComponentSslContextFactory@e3c0e40(null,null)
- Using SSLEngineImpl.
- 09:48:58.255 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLEngine [7f8a9499[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] created from SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:58.256 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [7f8a9499[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set cipher suites [null],
- cipher suite patterns [null],
- available cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]],
- currently enabled cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]],
- and default cipher suite patterns [Patterns [includes=[.*], excludes=[.*_NULL_.*, .*_anon_.*, .*_EXPORT_.*, .*_DES_.*]]].
- Resulting enabled cipher suites are [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]].
- 09:48:58.257 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [7f8a9499[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set protocols [null],
- protocol patterns [null],
- available protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- currently enabled protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- and default protocol patterns [Patterns [includes=[.*], excludes=[SSL.*]]].
- Resulting enabled protocols are [[TLSv1, TLSv1.1, TLSv1.2]].
- 09:48:58.257 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring client-auth on SSLEngine [7f8a9499[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] to [REQUIRE].
- 09:48:58.265 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4657ms SslConnectionFactory@4bd31064{SSL-HTTP/1.1}
- 09:48:58.265 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting HttpConnectionFactory@589da3f3{HTTP/1.1}
- 09:48:58.266 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4657ms HttpConnectionFactory@589da3f3{HTTP/1.1}
- 09:48:58.267 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@4ef782af
- 09:48:58.268 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.io.SelectorManager$ManagedSelector@a37aefe keys=-1 selected=-1
- 09:48:58.268 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4660ms org.eclipse.jetty.io.SelectorManager$ManagedSelector@a37aefe keys=0 selected=0
- 09:48:58.273 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4664ms org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@4ef782af
- 09:48:58.273 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292} added {acceptor-0@5d99c6b5,POJO}
- 09:48:58.273 [main] INFO org.eclipse.jetty.server.ServerConnector - Started ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292}
- 09:48:58.273 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4665ms ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292}
- 09:48:58.273 [main] INFO org.eclipse.jetty.server.Server - Started @4665ms
- 09:48:58.273 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4665ms org.eclipse.jetty.server.Server@6ea2bc93
- 09:48:58.282 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Starting Thread[CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0,5,main] on org.eclipse.jetty.io.SelectorManager$ManagedSelector@a37aefe keys=0 selected=0
- 09:48:58.282 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 09:48:58.297 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@479cbee5 added {de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10@2542c2f5==de.tst.camel.test.server.WebsocketComponentServlet,-1,true,UNMANAGED}
- 09:48:58.307 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@479cbee5 added {[/echo]=>de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10,POJO}
- 09:48:58.309 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/echo mapped to servlet=de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10 from default=false
- 09:48:58.310 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/ mapped to servlet=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3 from default=true
- 09:48:58.310 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 09:48:58.311 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 09:48:58.311 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 09:48:58.311 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap={/echo=de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10@2542c2f5==de.tst.camel.test.server.WebsocketComponentServlet,-1,true, /=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 09:48:58.312 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-59e2d8e3@5552a6e7==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false, de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10=de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10@2542c2f5==de.tst.camel.test.server.WebsocketComponentServlet,-1,true}
- 09:48:58.312 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10@2542c2f5==de.tst.camel.test.server.WebsocketComponentServlet,-1,true
- 09:48:58.329 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4707ms de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10@2542c2f5==de.tst.camel.test.server.WebsocketComponentServlet,-1,true
- 09:48:58.332 [main] DEBUG org.eclipse.jetty.servlet.ServletHolder - Servlet.init de.tst.camel.test.server.WebsocketComponentServlet@48c76607 for de.tst.camel.test.server.WebsocketComponentServlet-6a57ae10
- 09:48:58.341 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@57ad2aa7 added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@4167d97b,AUTO}
- 09:48:58.341 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@57ad2aa7 added {org.eclipse.jetty.io.MappedByteBufferPool@5b3f61ff,POJO}
- 09:48:58.366 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@4b7dc788 added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@35399441,AUTO}
- 09:48:58.366 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@4b7dc788 added {org.eclipse.jetty.io.MappedByteBufferPool@5b3f61ff,POJO}
- 09:48:58.367 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.websocket.server.WebSocketServerFactory@4b7dc788
- 09:48:58.368 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@35399441
- 09:48:58.368 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4759ms org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@35399441
- 09:48:58.368 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4759ms org.eclipse.jetty.websocket.server.WebSocketServerFactory@4b7dc788
- 09:48:58.368 [main] DEBUG de.tst.camel.test.server.WebsocketComponent - WebSocket servlet added for the following path : /echo, to the Jetty Server : testserver:localhost:9292
- 09:48:58.368 [main] DEBUG de.tst.camel.test.server.WebsocketComponentServlet - Connecting consumer: Consumer[testserver://localhost:9292/echo]
- 09:48:58.368 [main] INFO org.apache.camel.impl.DefaultCamelContext - Route: route1 started and consuming from: Endpoint[testserver://localhost:9292/echo]
- 09:48:58.368 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.368 [main] TRACE org.apache.camel.util.EventHelper - Notifier: org.apache.camel.impl.DefaultRuntimeEndpointRegistry@64e7619d is not enabled for the event: Started route: route1
- 09:48:58.369 [main] INFO org.apache.camel.impl.DefaultCamelContext - Total 2 routes, of which 2 is started.
- 09:48:58.369 [main] INFO org.apache.camel.impl.DefaultCamelContext - Apache Camel 2.16.3 (CamelContext: camel-1) started in 1.622 seconds
- 09:48:58.369 [main] TRACE org.apache.camel.util.EventHelper - Notifier: org.apache.camel.impl.DefaultRuntimeEndpointRegistry@64e7619d is not enabled for the event: Started CamelContext: camel-1
- 09:48:58.370 [main] DEBUG de.tst.camel.test.both.WssProducerConsumerTest - Routing Rules are: [EventDrivenConsumerRoute[Endpoint[direct://input] -> Pipeline[[Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]], Channel[sendTo(Endpoint[testclient://localhost:9292/echo])], Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]]]], EventDrivenConsumerRoute[Endpoint[testserver://localhost:9292/echo] -> Pipeline[[Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]], Channel[sendTo(Endpoint[mock://result])]]]]]
- 09:48:58.370 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: mock:result
- 09:48:58.370 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: mock:result, normalized uri: mock://result
- 09:48:58.371 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: direct:input
- 09:48:58.371 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: direct:input, normalized uri: direct://input
- 09:48:58.372 [main] TRACE org.apache.camel.impl.SharedProducerServicePool - No free services in pool to acquire for key: Endpoint[direct://input]
- 09:48:58.372 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 09:48:58.373 [main] DEBUG org.apache.camel.component.direct.DirectProducer - Starting producer: Producer[direct://input]
- 09:48:58.373 [main] DEBUG org.apache.camel.impl.ProducerCache - Adding to producer cache with key: Endpoint[direct://input] for producer: Producer[direct://input]
- 09:48:58.375 [main] DEBUG org.apache.camel.impl.ProducerCache - >>>> Endpoint[direct://input] Exchange[][Message: Hello World!]
- 09:48:58.388 [main] TRACE org.apache.camel.impl.DefaultUnitOfWork - UnitOfWork created for ExchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 with Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.396 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 -> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.397 [main] TRACE org.apache.camel.impl.DefaultUnitOfWork - UnitOfWork beforeRoute: foo for ExchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 with Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.398 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 -> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.399 [main] TRACE org.apache.camel.processor.Pipeline - ExchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 should continue routing: true
- 09:48:58.399 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 >>> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.400 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 -> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.401 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - isRunAllowed() -> true (Run allowed if we are not stopped/stopping)
- 09:48:58.403 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: >>> Message from direct to WebSocket Client :
- 09:48:58.412 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: Hello World!
- 09:48:58.414 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: >>> Message from direct to WebSocket Client : Hello World!
- 09:48:58.414 [main] INFO foo - >>> Message from direct to WebSocket Client : Hello World!
- 09:48:58.562 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - Is exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 interrupted? false
- 09:48:58.562 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - Is exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 done? true
- 09:48:58.562 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Exchange processed and is continued routed synchronously for exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 -> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.563 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 is continued being processed synchronously
- 09:48:58.567 [main] TRACE org.apache.camel.processor.Pipeline - ExchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 should continue routing: true
- 09:48:58.567 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 >>> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.568 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-42202-1477381736147-0-1 -> Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.568 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - isRunAllowed() -> true (Run allowed if we are not stopped/stopping)
- 09:48:58.568 [main] DEBUG org.apache.camel.processor.SendProcessor - >>>> Endpoint[testclient://localhost:9292/echo] Exchange[ID-ubuntu-dev-42202-1477381736147-0-1][Message: Hello World!]
- 09:48:58.569 [main] DEBUG de.tst.camel.test.client.WsProducer - Sending out Hello World!
- 09:48:58.570 [main] INFO de.tst.camel.test.client.WsEndpoint - Reconnecting websocket: wss://localhost:9292/echo
- 09:48:58.570 [main] DEBUG de.tst.camel.test.client.WsEndpoint - Connecting to wss://localhost:9292/echo
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- Finalizer, called close()
- Finalizer, called closeInternal(true)
- Finalizer, called closeSocket(true)
- trigger seeding of SecureRandom
- done seeding SecureRandom
- keyStore is :
- keyStore type is : jks
- keyStore provider is :
- init keystore
- init keymanager of type SunX509
- trustStore is: /usr/lib/jvm/java-8-openjdk-amd64/jre/lib/security/cacerts
- trustStore type is : jks
- trustStore provider is :
- init truststore
- adding as trusted cert:
- Subject: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK
- Issuer: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK
- Algorithm: RSA; Serial number: 0x3e8
- Valid from Thu May 15 07:13:14 CEST 2003 until Mon May 15 06:52:29 CEST 2023
- adding as trusted cert:
- Subject: CN=SecureTrust CA, O=SecureTrust Corporation, C=US
- Issuer: CN=SecureTrust CA, O=SecureTrust Corporation, C=US
- Algorithm: RSA; Serial number: 0xcf08e5c0816a5ad427ff0eb271859d0
- Valid from Tue Nov 07 20:31:18 CET 2006 until Mon Dec 31 20:40:55 CET 2029
- adding as trusted cert:
- Subject: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
- Issuer: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
- Algorithm: EC; Serial number: 0xa68b79290000000050d091f9
- Valid from Tue Dec 18 16:25:36 CET 2012 until Fri Dec 18 16:55:36 CET 2037
- adding as trusted cert:
- Subject: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP
- Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 30 06:20:49 CEST 2003 until Sat Sep 30 06:20:49 CEST 2023
- adding as trusted cert:
- Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0x83be056904246b1a1756ac95991c74a
- Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031
- adding as trusted cert:
- Subject: CN=Microsec e-Szigno Root CA, OU=e-Szigno CA, O=Microsec Ltd., L=Budapest, C=HU
- Issuer: CN=Microsec e-Szigno Root CA, OU=e-Szigno CA, O=Microsec Ltd., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0xccb8e7bf4e291afda2dc66a51c2c0f11
- Valid from Wed Apr 06 14:28:44 CEST 2005 until Thu Apr 06 14:28:44 CEST 2017
- adding as trusted cert:
- Subject: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x445734245b81899b35f2ceb82b3b5ba726f07528
- Valid from Thu Jan 12 19:59:32 CET 2012 until Sun Jan 12 19:59:32 CET 2042
- adding as trusted cert:
- Subject: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0x59b1b579e8e2132e23907bda777755c
- Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038
- adding as trusted cert:
- Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US
- Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US
- Algorithm: RSA; Serial number: 0x4
- Valid from Mon Jun 21 06:00:00 CEST 1999 until Sun Jun 21 06:00:00 CEST 2020
- adding as trusted cert:
- Subject: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x18acb56afd69b6153a636cafdafac4a1
- Valid from Mon Nov 27 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: C=IL, O=ComSign, CN=ComSign CA
- Issuer: C=IL, O=ComSign, CN=ComSign CA
- Algorithm: RSA; Serial number: 0x1413968314558cea7b63e5fc34877744
- Valid from Wed Mar 24 12:32:18 CET 2004 until Mon Mar 19 16:02:18 CET 2029
- adding as trusted cert:
- Subject: O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007, L=Ankara, C=TR, CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
- Issuer: O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007, L=Ankara, C=TR, CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Dec 25 19:37:19 CET 2007 until Fri Dec 22 19:37:19 CET 2017
- adding as trusted cert:
- Subject: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP
- Issuer: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP
- Algorithm: RSA; Serial number: 0x0
- Valid from Fri May 29 07:00:39 CEST 2009 until Tue May 29 07:00:39 CEST 2029
- adding as trusted cert:
- Subject: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL
- Issuer: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL
- Algorithm: RSA; Serial number: 0x98968a
- Valid from Tue Dec 17 10:23:49 CET 2002 until Wed Dec 16 10:15:38 CET 2015
- adding as trusted cert:
- Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6
- Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US
- Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US
- Algorithm: RSA; Serial number: 0x1
- Valid from Mon Jun 21 06:00:00 CEST 1999 until Sun Jun 21 06:00:00 CEST 2020
- adding as trusted cert:
- Subject: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW
- Issuer: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW
- Algorithm: RSA; Serial number: 0x15c8bd65475cafb897005ee406d2bc9d
- Valid from Mon Dec 20 03:31:27 CET 2004 until Wed Dec 20 03:31:27 CET 2034
- adding as trusted cert:
- Subject: CN=AffirmTrust Commercial, O=AffirmTrust, C=US
- Issuer: CN=AffirmTrust Commercial, O=AffirmTrust, C=US
- Algorithm: RSA; Serial number: 0x7777062726a9b17c
- Valid from Fri Jan 29 15:06:06 CET 2010 until Tue Dec 31 15:06:06 CET 2030
- adding as trusted cert:
- Subject: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
- Issuer: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
- Algorithm: RSA; Serial number: 0x444c0
- Valid from Wed Oct 22 14:07:37 CEST 2008 until Mon Dec 31 13:07:37 CET 2029
- adding as trusted cert:
- Subject: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL
- Issuer: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL
- Algorithm: RSA; Serial number: 0x1
- Valid from Sun Sep 17 21:46:36 CEST 2006 until Wed Sep 17 21:46:36 CEST 2036
- adding as trusted cert:
- Subject: CN=Certinomis - Autorité Racine, OU=0002 433998903, O=Certinomis, C=FR
- Issuer: CN=Certinomis - Autorité Racine, OU=0002 433998903, O=Certinomis, C=FR
- Algorithm: RSA; Serial number: 0x1
- Valid from Wed Sep 17 10:28:59 CEST 2008 until Sun Sep 17 10:28:59 CEST 2028
- adding as trusted cert:
- Subject: CN=DST ACES CA X6, OU=DST ACES, O=Digital Signature Trust, C=US
- Issuer: CN=DST ACES CA X6, OU=DST ACES, O=Digital Signature Trust, C=US
- Algorithm: RSA; Serial number: 0xd5e990ad69db778ecd807563b8615d9
- Valid from Thu Nov 20 22:19:58 CET 2003 until Mon Nov 20 22:19:58 CET 2017
- adding as trusted cert:
- Subject: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US
- Issuer: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US
- Algorithm: RSA; Serial number: 0x50946cec18ead59c4dd597ef758fa0ad
- Valid from Mon Nov 01 18:14:04 CET 2004 until Mon Jan 01 06:37:19 CET 2035
- adding as trusted cert:
- Subject: CN=EC-ACC, OU=Jerarquia Entitats de Certificacio Catalanes, OU=Vegeu https://www.catcert.net/verarrel (c)03, OU=Serveis Publics de Certificacio, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), C=ES
- Issuer: CN=EC-ACC, OU=Jerarquia Entitats de Certificacio Catalanes, OU=Vegeu https://www.catcert.net/verarrel (c)03, OU=Serveis Publics de Certificacio, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), C=ES
- Algorithm: RSA; Serial number: 0x-11d4c2142bde21eb579d53fb0c223bff
- Valid from Wed Jan 08 00:00:00 CET 2003 until Tue Jan 07 23:59:59 CET 2031
- adding as trusted cert:
- Subject: CN=CA Disig Root R1, O=Disig a.s., L=Bratislava, C=SK
- Issuer: CN=CA Disig Root R1, O=Disig a.s., L=Bratislava, C=SK
- Algorithm: RSA; Serial number: 0xc3039aee50906e28
- Valid from Thu Jul 19 11:06:56 CEST 2012 until Sat Jul 19 11:06:56 CEST 2042
- adding as trusted cert:
- Subject: CN=Sonera Class2 CA, O=Sonera, C=FI
- Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI
- Algorithm: RSA; Serial number: 0x1d
- Valid from Fri Apr 06 09:29:40 CEST 2001 until Tue Apr 06 09:29:40 CEST 2021
- adding as trusted cert:
- Subject: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
- Algorithm: EC; Serial number: 0x3cb2f4480a00e2feeb243b5e603ec36b
- Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US
- Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US
- Algorithm: RSA; Serial number: 0x35def4cf
- Valid from Sat Aug 22 18:41:51 CEST 1998 until Wed Aug 22 18:41:51 CEST 2018
- adding as trusted cert:
- Subject: CN=Certinomis - Root CA, OU=0002 433998903, O=Certinomis, C=FR
- Issuer: CN=Certinomis - Root CA, OU=0002 433998903, O=Certinomis, C=FR
- Algorithm: RSA; Serial number: 0x1
- Valid from Mon Oct 21 11:17:18 CEST 2013 until Fri Oct 21 11:17:18 CEST 2033
- adding as trusted cert:
- Subject: CN=CA 沃通根证书, O=WoSign CA Limited, C=CN
- Issuer: CN=CA 沃通根证书, O=WoSign CA Limited, C=CN
- Algorithm: RSA; Serial number: 0x50706bcdd813fc1b4e3b3372d211488d
- Valid from Sat Aug 08 03:00:01 CEST 2009 until Mon Aug 08 03:00:01 CEST 2039
- adding as trusted cert:
- Subject: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: EC; Serial number: 0x1f47afaa62007050544c019e9b63992a
- Valid from Thu Mar 06 01:00:00 CET 2008 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0x2ac5c266a0b409b8f0b79f2ae462577
- Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031
- adding as trusted cert:
- Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3
- Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3
- Algorithm: RSA; Serial number: 0x4000000000121585308a2
- Valid from Wed Mar 18 11:00:00 CET 2009 until Sun Mar 18 11:00:00 CET 2029
- adding as trusted cert:
- Subject: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Mar 04 06:00:00 CET 2004 until Sun Mar 04 06:00:00 CET 2029
- adding as trusted cert:
- Subject: CN=Certification Authority of WoSign, O=WoSign CA Limited, C=CN
- Issuer: CN=Certification Authority of WoSign, O=WoSign CA Limited, C=CN
- Algorithm: RSA; Serial number: 0x5e68d61171946350560068f33ec9c591
- Valid from Sat Aug 08 03:00:01 CEST 2009 until Mon Aug 08 03:00:01 CEST 2039
- adding as trusted cert:
- Subject: CN=GeoTrust Universal CA 2, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Universal CA 2, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Mar 04 06:00:00 CET 2004 until Sun Mar 04 06:00:00 CET 2029
- adding as trusted cert:
- Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
- Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
- Algorithm: RSA; Serial number: 0x20000b9
- Valid from Fri May 12 20:46:00 CEST 2000 until Tue May 13 01:59:00 CEST 2025
- adding as trusted cert:
- Subject: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Jan 01 01:00:00 CET 2004 until Mon Jan 01 00:59:59 CET 2029
- adding as trusted cert:
- Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US
- Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Jun 29 19:39:16 CEST 2004 until Thu Jun 29 19:39:16 CEST 2034
- adding as trusted cert:
- Subject: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU
- Issuer: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 30 18:13:43 CEST 2003 until Wed Sep 30 18:13:44 CEST 2037
- adding as trusted cert:
- Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
- Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
- Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362afe650afd
- Valid from Fri Jul 09 20:10:42 CEST 1999 until Tue Jul 09 20:19:22 CEST 2019
- adding as trusted cert:
- Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57
- Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
- Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
- Algorithm: RSA; Serial number: 0x40000000001154b5ac394
- Valid from Tue Sep 01 14:00:00 CEST 1998 until Fri Jan 28 13:00:00 CET 2028
- adding as trusted cert:
- Subject: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR
- Issuer: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR
- Algorithm: RSA; Serial number: 0x8e17fe242081
- Valid from Tue Apr 30 10:07:01 CEST 2013 until Fri Apr 28 10:07:01 CEST 2023
- adding as trusted cert:
- Subject: CN=AffirmTrust Networking, O=AffirmTrust, C=US
- Issuer: CN=AffirmTrust Networking, O=AffirmTrust, C=US
- Algorithm: RSA; Serial number: 0x7c4f04391cd4992d
- Valid from Fri Jan 29 15:08:24 CET 2010 until Tue Dec 31 15:08:24 CET 2030
- adding as trusted cert:
- Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW
- Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW
- Algorithm: RSA; Serial number: 0xcbe
- Valid from Wed Jun 27 08:28:33 CEST 2012 until Tue Dec 31 16:59:59 CET 2030
- adding as trusted cert:
- Subject: CN=AffirmTrust Premium, O=AffirmTrust, C=US
- Issuer: CN=AffirmTrust Premium, O=AffirmTrust, C=US
- Algorithm: RSA; Serial number: 0x6d8c1446b1a60aee
- Valid from Fri Jan 29 15:10:36 CET 2010 until Mon Dec 31 15:10:36 CET 2040
- adding as trusted cert:
- Subject: CN=NetLock Expressz (Class C) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Issuer: CN=NetLock Expressz (Class C) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0x68
- Valid from Thu Feb 25 15:08:11 CET 1999 until Wed Feb 20 15:08:11 CET 2019
- adding as trusted cert:
- Subject: [email protected], CN=IGC/A, OU=DCSSI, O=PM/SGDN, L=Paris, ST=France, C=FR
- Issuer: [email protected], CN=IGC/A, OU=DCSSI, O=PM/SGDN, L=Paris, ST=France, C=FR
- Algorithm: RSA; Serial number: 0x3911451094
- Valid from Fri Dec 13 15:29:23 CET 2002 until Sat Oct 17 16:29:22 CEST 2020
- adding as trusted cert:
- Subject: O=Government Root Certification Authority, C=TW
- Issuer: O=Government Root Certification Authority, C=TW
- Algorithm: RSA; Serial number: 0x1f9d595ad72fc20644a5800869e35ef6
- Valid from Thu Dec 05 14:23:33 CET 2002 until Sun Dec 05 14:23:33 CET 2032
- adding as trusted cert:
- Subject: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x15ac6e9419b2794b41f627a9c3180f1f
- Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037
- adding as trusted cert:
- Subject: CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW
- Issuer: CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Aug 28 09:24:33 CEST 2008 until Tue Dec 31 16:59:59 CET 2030
- adding as trusted cert:
- Subject: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
- Issuer: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
- Algorithm: RSA; Serial number: 0xa3da427ea4b1aeda
- Valid from Fri Aug 01 14:29:50 CEST 2008 until Sat Jul 31 14:29:50 CEST 2038
- adding as trusted cert:
- Subject: C=DE, O=Atos, CN=Atos TrustedRoot 2011
- Issuer: C=DE, O=Atos, CN=Atos TrustedRoot 2011
- Algorithm: RSA; Serial number: 0x5c33cb622c5fb332
- Valid from Thu Jul 07 16:58:30 CEST 2011 until Wed Jan 01 00:59:59 CET 2031
- adding as trusted cert:
- Subject: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH
- Issuer: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH
- Algorithm: RSA; Serial number: 0x4f1bd42f54bb2f4b
- Valid from Wed Oct 25 10:32:46 CEST 2006 until Sat Oct 25 10:32:46 CEST 2036
- adding as trusted cert:
- Subject: CN=CNNIC ROOT, O=CNNIC, C=CN
- Issuer: CN=CNNIC ROOT, O=CNNIC, C=CN
- Algorithm: RSA; Serial number: 0x49330001
- Valid from Mon Apr 16 09:09:14 CEST 2007 until Fri Apr 16 09:09:14 CEST 2027
- adding as trusted cert:
- Subject: CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP
- Issuer: CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP
- Algorithm: RSA; Serial number: 0x1
- Valid from Wed Apr 08 06:56:47 CEST 2009 until Sun Apr 08 06:56:47 CEST 2029
- adding as trusted cert:
- Subject: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
- Issuer: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
- Algorithm: RSA; Serial number: 0x4a538c28
- Valid from Tue Jul 07 19:25:54 CEST 2009 until Sat Dec 07 18:55:54 CET 2030
- adding as trusted cert:
- Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0xce7e0e517d846fe8fe560fc1bf03039
- Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET 2031
- adding as trusted cert:
- Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
- Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Jun 29 19:06:20 CEST 2004 until Thu Jun 29 19:06:20 CEST 2034
- adding as trusted cert:
- Subject: CN=Secure Global CA, O=SecureTrust Corporation, C=US
- Issuer: CN=Secure Global CA, O=SecureTrust Corporation, C=US
- Algorithm: RSA; Serial number: 0x75622a4e8d48a894df413c8f0f8eaa5
- Valid from Tue Nov 07 20:42:28 CET 2006 until Mon Dec 31 20:52:06 CET 2029
- adding as trusted cert:
- Subject: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
- Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue May 30 12:48:38 CEST 2000 until Sat May 30 12:48:38 CEST 2020
- adding as trusted cert:
- Subject: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Jan 01 01:00:00 CET 2004 until Mon Jan 01 00:59:59 CET 2029
- adding as trusted cert:
- Subject: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE
- Issuer: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Wed Oct 01 12:29:56 CEST 2008 until Sun Oct 02 01:59:59 CEST 2033
- adding as trusted cert:
- Subject: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: EC; Serial number: 0x55556bcf25ea43535c3a40fd5ab4572
- Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038
- adding as trusted cert:
- Subject: CN=Swisscom Root CA 1, OU=Digital Certificate Services, O=Swisscom, C=ch
- Issuer: CN=Swisscom Root CA 1, OU=Digital Certificate Services, O=Swisscom, C=ch
- Algorithm: RSA; Serial number: 0x5c0b855c0be75941df57cc3f7f9da836
- Valid from Thu Aug 18 14:06:20 CEST 2005 until Tue Aug 19 00:06:20 CEST 2025
- adding as trusted cert:
- Subject: CN=PSCProcert, C=VE, O=Sistema Nacional de Certificacion Electronica, OU=Proveedor de Certificados PROCERT, ST=Miranda, L=Chacao, [email protected]
- Issuer: [email protected], OU=Superintendencia de Servicios de Certificacion Electronica, O=Sistema Nacional de Certificacion Electronica, ST=Distrito Capital, L=Caracas, C=VE, CN=Autoridad de Certificacion Raiz del Estado Venezolano
- Algorithm: RSA; Serial number: 0xb
- Valid from Tue Dec 28 17:51:00 CET 2010 until Sat Dec 26 00:59:59 CET 2020
- adding as trusted cert:
- Subject: CN=Juur-SK, O=AS Sertifitseerimiskeskus, C=EE, [email protected]
- Issuer: CN=Juur-SK, O=AS Sertifitseerimiskeskus, C=EE, [email protected]
- Algorithm: RSA; Serial number: 0x3b8e4bfc
- Valid from Thu Aug 30 16:23:01 CEST 2001 until Fri Aug 26 16:23:01 CEST 2016
- adding as trusted cert:
- Subject: C=TR, O=EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., CN=EBG Elektronik Sertifika Hizmet Sağlayıcısı
- Issuer: C=TR, O=EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., CN=EBG Elektronik Sertifika Hizmet Sağlayıcısı
- Algorithm: RSA; Serial number: 0x4caf73421c8e7402
- Valid from Thu Aug 17 02:21:09 CEST 2006 until Sun Aug 14 02:31:09 CEST 2016
- adding as trusted cert:
- Subject: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
- Issuer: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
- Algorithm: RSA; Serial number: 0x44be0c8b500024b411d336252567c989
- Valid from Fri Jul 09 19:28:50 CEST 1999 until Tue Jul 09 19:36:58 CEST 2019
- adding as trusted cert:
- Subject: CN=GeoTrust Global CA 2, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Global CA 2, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Mar 04 06:00:00 CET 2004 until Mon Mar 04 06:00:00 CET 2019
- adding as trusted cert:
- Subject: CN=Class 2 Primary CA, O=Certplus, C=FR
- Issuer: CN=Class 2 Primary CA, O=Certplus, C=FR
- Algorithm: RSA; Serial number: 0x85bd4bf3d8dae369f694d75fc3a54423
- Valid from Wed Jul 07 19:05:00 CEST 1999 until Sun Jul 07 01:59:59 CEST 2019
- adding as trusted cert:
- Subject: CN=OISTE WISeKey Global Root GA CA, OU=OISTE Foundation Endorsed, OU=Copyright (c) 2005, O=WISeKey, C=CH
- Issuer: CN=OISTE WISeKey Global Root GA CA, OU=OISTE Foundation Endorsed, OU=Copyright (c) 2005, O=WISeKey, C=CH
- Algorithm: RSA; Serial number: 0x413d72c7f46b1f81437df1d22854df9a
- Valid from Sun Dec 11 17:03:44 CET 2005 until Fri Dec 11 17:09:51 CET 2037
- adding as trusted cert:
- Subject: [email protected], CN=NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Issuer: [email protected], CN=NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0x7b
- Valid from Sun Mar 30 03:47:11 CEST 2003 until Thu Dec 15 02:47:11 CET 2022
- adding as trusted cert:
- Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US
- Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US
- Algorithm: RSA; Serial number: 0x23456
- Valid from Tue May 21 06:00:00 CEST 2002 until Sat May 21 06:00:00 CEST 2022
- adding as trusted cert:
- Subject: CN=Network Solutions Certificate Authority, O=Network Solutions L.L.C., C=US
- Issuer: CN=Network Solutions Certificate Authority, O=Network Solutions L.L.C., C=US
- Algorithm: RSA; Serial number: 0x57cb336fc25c16e6471617e3903168e0
- Valid from Fri Dec 01 01:00:00 CET 2006 until Tue Jan 01 00:59:59 CET 2030
- adding as trusted cert:
- Subject: CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN
- Issuer: CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN
- Algorithm: RSA; Serial number: 0x184accd6
- Valid from Wed Aug 08 05:07:01 CEST 2012 until Mon Dec 31 04:07:01 CET 2029
- adding as trusted cert:
- Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
- Issuer: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
- Algorithm: RSA; Serial number: 0x4eb200670c035d4f
- Valid from Wed Oct 25 10:36:00 CEST 2006 until Sat Oct 25 10:36:00 CEST 2036
- adding as trusted cert:
- Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5
- Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5
- Algorithm: EC; Serial number: 0x605949e0262ebb55f90a778a71f94ad86c
- Valid from Tue Nov 13 01:00:00 CET 2012 until Tue Jan 19 04:14:07 CET 2038
- adding as trusted cert:
- Subject: CN=CA Disig, O=Disig a.s., L=Bratislava, C=SK
- Issuer: CN=CA Disig, O=Disig a.s., L=Bratislava, C=SK
- Algorithm: RSA; Serial number: 0x1
- Valid from Wed Mar 22 02:39:34 CET 2006 until Tue Mar 22 02:39:34 CET 2016
- adding as trusted cert:
- Subject: CN=S-TRUST Authentication and Encryption Root CA 2005:PN, O=Deutscher Sparkassen Verlag GmbH, L=Stuttgart, ST=Baden-Wuerttemberg (BW), C=DE
- Issuer: CN=S-TRUST Authentication and Encryption Root CA 2005:PN, O=Deutscher Sparkassen Verlag GmbH, L=Stuttgart, ST=Baden-Wuerttemberg (BW), C=DE
- Algorithm: RSA; Serial number: 0x371918e653547c1ab5b8cb595adb35b7
- Valid from Wed Jun 22 02:00:00 CEST 2005 until Sat Jun 22 01:59:59 CEST 2030
- adding as trusted cert:
- Subject: CN=CA WoSign ECC Root, O=WoSign CA Limited, C=CN
- Issuer: CN=CA WoSign ECC Root, O=WoSign CA Limited, C=CN
- Algorithm: EC; Serial number: 0x684a5870806bf08f02faf6dee8b09090
- Valid from Sat Nov 08 01:58:58 CET 2014 until Tue Nov 08 01:58:58 CET 2044
- adding as trusted cert:
- Subject: CN=Hellenic Academic and Research Institutions RootCA 2011, O=Hellenic Academic and Research Institutions Cert. Authority, C=GR
- Issuer: CN=Hellenic Academic and Research Institutions RootCA 2011, O=Hellenic Academic and Research Institutions Cert. Authority, C=GR
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Dec 06 14:49:52 CET 2011 until Mon Dec 01 14:49:52 CET 2031
- adding as trusted cert:
- Subject: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x6170cb498c5f984529e7b0a6d9505b7a
- Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
- Issuer: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US
- Issuer: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US
- Algorithm: RSA; Serial number: 0xa0142800000014523cf467c00000002
- Valid from Thu Jan 16 18:53:32 CET 2014 until Mon Jan 16 18:53:32 CET 2034
- adding as trusted cert:
- Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
- Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
- Algorithm: RSA; Serial number: 0x3863def8
- Valid from Fri Dec 24 18:50:51 CET 1999 until Tue Jul 24 16:15:12 CEST 2029
- adding as trusted cert:
- Subject: CN=Staat der Nederlanden Root CA - G3, O=Staat der Nederlanden, C=NL
- Issuer: CN=Staat der Nederlanden Root CA - G3, O=Staat der Nederlanden, C=NL
- Algorithm: RSA; Serial number: 0x98a239
- Valid from Thu Nov 14 12:28:42 CET 2013 until Tue Nov 14 00:00:00 CET 2028
- adding as trusted cert:
- Subject: CN=TeliaSonera Root CA v1, O=TeliaSonera
- Issuer: CN=TeliaSonera Root CA v1, O=TeliaSonera
- Algorithm: RSA; Serial number: 0x95be16a0f72e46f17b398272fa8bcd96
- Valid from Thu Oct 18 14:00:50 CEST 2007 until Mon Oct 18 14:00:50 CEST 2032
- adding as trusted cert:
- Subject: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
- Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
- Algorithm: RSA; Serial number: 0x344ed55720d5edec49f42fce37db2b6d
- Valid from Fri Nov 17 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US
- Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=Visa eCommerce Root, OU=Visa International Service Association, O=VISA, C=US
- Issuer: CN=Visa eCommerce Root, OU=Visa International Service Association, O=VISA, C=US
- Algorithm: RSA; Serial number: 0x1386354d1d3f06f2c1f96505d5901c62
- Valid from Wed Jun 26 04:18:36 CEST 2002 until Fri Jun 24 02:16:12 CEST 2022
- adding as trusted cert:
- Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x8b5b75568454850b00cfaf3848ceb1a4
- Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: EC; Serial number: 0x2f80fe238c0e220f486712289187acb3
- Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=Staat der Nederlanden EV Root CA, O=Staat der Nederlanden, C=NL
- Issuer: CN=Staat der Nederlanden EV Root CA, O=Staat der Nederlanden, C=NL
- Algorithm: RSA; Serial number: 0x98968d
- Valid from Wed Dec 08 12:19:29 CET 2010 until Thu Dec 08 12:10:28 CET 2022
- adding as trusted cert:
- Subject: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US
- Issuer: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US
- Algorithm: RSA; Serial number: 0x456b5054
- Valid from Mon Nov 27 21:23:42 CET 2006 until Fri Nov 27 21:53:42 CET 2026
- adding as trusted cert:
- Subject: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES
- Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES
- Algorithm: RSA; Serial number: 0x3b45e568
- Valid from Fri Jul 06 18:22:47 CEST 2001 until Thu Jul 01 17:22:47 CEST 2021
- adding as trusted cert:
- Subject: CN=Certification Authority of WoSign G2, O=WoSign CA Limited, C=CN
- Issuer: CN=Certification Authority of WoSign G2, O=WoSign CA Limited, C=CN
- Algorithm: RSA; Serial number: 0x6b25da8a889d7cbc0f05b3b17a614544
- Valid from Sat Nov 08 01:58:58 CET 2014 until Tue Nov 08 01:58:58 CET 2044
- adding as trusted cert:
- Subject: CN=S-TRUST Universal Root CA, OU=S-TRUST Certification Services, O=Deutscher Sparkassen Verlag GmbH, C=DE
- Issuer: CN=S-TRUST Universal Root CA, OU=S-TRUST Certification Services, O=Deutscher Sparkassen Verlag GmbH, C=DE
- Algorithm: RSA; Serial number: 0x6056c54b23405b64d4ed25dad9d61e1e
- Valid from Tue Oct 22 02:00:00 CEST 2013 until Fri Oct 22 01:59:59 CEST 2038
- adding as trusted cert:
- Subject: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0xb931c3ad63967ea6723bfc3af9af44b
- Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038
- adding as trusted cert:
- Subject: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL
- Issuer: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL
- Algorithm: RSA; Serial number: 0x2d
- Valid from Sun Sep 17 21:46:37 CEST 2006 until Wed Sep 17 21:46:36 CEST 2036
- adding as trusted cert:
- Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL
- Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL
- Algorithm: RSA; Serial number: 0x10020
- Valid from Tue Jun 11 12:46:39 CEST 2002 until Fri Jun 11 12:46:39 CEST 2027
- adding as trusted cert:
- Subject: CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK
- Issuer: CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK
- Algorithm: RSA; Serial number: 0x92b888dbb08ac163
- Valid from Thu Jul 19 11:15:30 CEST 2012 until Sat Jul 19 11:15:30 CEST 2042
- adding as trusted cert:
- Subject: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue May 30 12:44:50 CEST 2000 until Sat May 30 12:44:50 CEST 2020
- adding as trusted cert:
- Subject: CN=DST Root CA X3, O=Digital Signature Trust Co.
- Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co.
- Algorithm: RSA; Serial number: 0x44afb080d6a327ba893039862ef8406b
- Valid from Sat Sep 30 23:12:19 CEST 2000 until Thu Sep 30 16:01:15 CEST 2021
- adding as trusted cert:
- Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x70bae41d10d92934b638ca7b03ccbabf
- Valid from Mon Jan 29 01:00:00 CET 1996 until Wed Aug 02 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO
- Issuer: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO
- Algorithm: RSA; Serial number: 0x2
- Valid from Tue Oct 26 10:38:03 CEST 2010 until Fri Oct 26 10:38:03 CEST 2040
- adding as trusted cert:
- Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE
- Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE
- Algorithm: RSA; Serial number: 0x983f4
- Valid from Thu Nov 05 09:50:46 CET 2009 until Mon Nov 05 09:50:46 CET 2029
- adding as trusted cert:
- Subject: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: EC; Serial number: 0xba15afa1ddfa0b54944afcd24a06cec
- Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038
- adding as trusted cert:
- Subject: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH
- Issuer: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH
- Algorithm: RSA; Serial number: 0xbb401c43f55e4fb0
- Valid from Wed Oct 25 10:30:35 CEST 2006 until Sat Oct 25 10:30:35 CEST 2036
- adding as trusted cert:
- Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US
- Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US
- Algorithm: EC; Serial number: 0x5c8b99c55a94c5d27156decd8980cc26
- Valid from Mon Feb 01 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: OU=certSIGN ROOT CA, O=certSIGN, C=RO
- Issuer: OU=certSIGN ROOT CA, O=certSIGN, C=RO
- Algorithm: RSA; Serial number: 0x200605167002
- Valid from Tue Jul 04 19:20:04 CEST 2006 until Fri Jul 04 19:20:04 CEST 2031
- adding as trusted cert:
- Subject: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US
- Issuer: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US
- Algorithm: RSA; Serial number: 0xa0142800000014523c844b500000002
- Valid from Thu Jan 16 19:12:23 CET 2014 until Mon Jan 16 19:12:23 CET 2034
- adding as trusted cert:
- Subject: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x509
- Valid from Fri Nov 24 19:27:00 CET 2006 until Mon Nov 24 19:23:33 CET 2031
- adding as trusted cert:
- Subject: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE
- Issuer: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE
- Algorithm: RSA; Serial number: 0x983f3
- Valid from Thu Nov 05 09:35:58 CET 2009 until Mon Nov 05 09:35:58 CET 2029
- adding as trusted cert:
- Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE
- Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE
- Algorithm: RSA; Serial number: 0x26
- Valid from Fri Jul 09 14:11:00 CEST 1999 until Wed Jul 10 01:59:00 CEST 2019
- adding as trusted cert:
- Subject: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x78585f2ead2c194be3370735341328b596d46593
- Valid from Thu Jan 12 18:27:44 CET 2012 until Sun Jan 12 18:27:44 CET 2042
- adding as trusted cert:
- Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x3f691e819cf09a4af373ffb948a2e4dd
- Valid from Mon Jan 29 01:00:00 CET 1996 until Thu Aug 03 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US
- Issuer: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US
- Algorithm: RSA; Serial number: 0x1fd6d30fca3ca51a81bbc640e35032d
- Valid from Mon Feb 01 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0xb92f60cc889fa17a4609b85b706c8aaf
- Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=Izenpe.com, O=IZENPE S.A., C=ES
- Issuer: CN=Izenpe.com, O=IZENPE S.A., C=ES
- Algorithm: RSA; Serial number: 0xb0b75a16485fbfe1cbf58bd719e67d
- Valid from Thu Dec 13 14:08:28 CET 2007 until Sun Dec 13 09:27:25 CET 2037
- adding as trusted cert:
- Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2
- Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2
- Algorithm: RSA; Serial number: 0x400000000010f8626e60d
- Valid from Fri Dec 15 09:00:00 CET 2006 until Wed Dec 15 09:00:00 CET 2021
- adding as trusted cert:
- Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x18dad19e267de8bb4a2158cdcc6b3b4a
- Valid from Wed Nov 08 01:00:00 CET 2006 until Thu Jul 17 01:59:59 CEST 2036
- adding as trusted cert:
- Subject: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x5c6
- Valid from Fri Nov 24 20:11:23 CET 2006 until Mon Nov 24 20:06:44 CET 2031
- adding as trusted cert:
- Subject: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
- Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 01 02:00:00 CEST 2009 until Fri Jan 01 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR
- Issuer: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR
- Algorithm: RSA; Serial number: 0x7da1f265ec8a
- Valid from Wed Dec 18 10:04:10 CET 2013 until Sat Dec 16 10:04:10 CET 2023
- adding as trusted cert:
- Subject: CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH
- Issuer: CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH
- Algorithm: RSA; Serial number: 0x76b1205274f0858746b3f8231af6c2c0
- Valid from Mon Dec 01 16:00:32 CET 2014 until Thu Dec 01 16:10:31 CET 2039
- adding as trusted cert:
- Subject: CN=WellsSecure Public Root Certificate Authority, OU=Wells Fargo Bank NA, O=Wells Fargo WellsSecure, C=US
- Issuer: CN=WellsSecure Public Root Certificate Authority, OU=Wells Fargo Bank NA, O=Wells Fargo WellsSecure, C=US
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Dec 13 18:07:54 CET 2007 until Wed Dec 14 01:07:54 CET 2022
- adding as trusted cert:
- Subject: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch
- Issuer: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch
- Algorithm: RSA; Serial number: 0x1e9e28e848f2e5efc37c4a1e5a1867b6
- Valid from Fri Jun 24 10:38:14 CEST 2011 until Wed Jun 25 09:38:14 CEST 2031
- adding as trusted cert:
- Subject: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d
- Valid from Thu Jan 12 21:26:32 CET 2012 until Sun Jan 12 21:26:32 CET 2042
- adding as trusted cert:
- Subject: [email protected], CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU
- Issuer: [email protected], CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0xc27e43044e473f19
- Valid from Tue Jun 16 13:30:18 CEST 2009 until Sun Dec 30 12:30:18 CET 2029
- adding as trusted cert:
- Subject: CN=StartCom Certification Authority G2, O=StartCom Ltd., C=IL
- Issuer: CN=StartCom Certification Authority G2, O=StartCom Ltd., C=IL
- Algorithm: RSA; Serial number: 0x3b
- Valid from Fri Jan 01 02:00:01 CET 2010 until Sun Jan 01 00:59:01 CET 2040
- adding as trusted cert:
- Subject: CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU
- Issuer: CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0x49412ce40010
- Valid from Thu Dec 11 16:08:21 CET 2008 until Wed Dec 06 16:08:21 CET 2028
- adding as trusted cert:
- Subject: CN=TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3, OU=Kamu Sertifikasyon Merkezi, OU=Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü - UEKAE, O=Türkiye Bilimsel ve Teknolojik Araştırma Kurumu - TÜBİTAK, L=Gebze - Kocaeli, C=TR
- Issuer: CN=TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3, OU=Kamu Sertifikasyon Merkezi, OU=Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü - UEKAE, O=Türkiye Bilimsel ve Teknolojik Araştırma Kurumu - TÜBİTAK, L=Gebze - Kocaeli, C=TR
- Algorithm: RSA; Serial number: 0x11
- Valid from Fri Aug 24 13:37:07 CEST 2007 until Mon Aug 21 13:37:07 CEST 2017
- adding as trusted cert:
- Subject: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT
- Issuer: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT
- Algorithm: RSA; Serial number: 0x570a119742c4e3cc
- Valid from Thu Sep 22 13:22:02 CEST 2011 until Sun Sep 22 13:22:02 CEST 2030
- adding as trusted cert:
- Subject: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES
- Issuer: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES
- Algorithm: RSA; Serial number: 0x53ec3beefbb2485f
- Valid from Wed May 20 10:38:15 CEST 2009 until Tue Dec 31 09:38:15 CET 2030
- adding as trusted cert:
- Subject: CN=Certigna, O=Dhimyotis, C=FR
- Issuer: CN=Certigna, O=Dhimyotis, C=FR
- Algorithm: RSA; Serial number: 0xfedce3010fc948ff
- Valid from Fri Jun 29 17:13:05 CEST 2007 until Tue Jun 29 17:13:05 CEST 2027
- adding as trusted cert:
- Subject: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Issuer: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue May 30 12:41:50 CEST 2000 until Sat May 30 12:41:50 CEST 2020
- adding as trusted cert:
- Subject: CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR
- Issuer: CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR
- Algorithm: RSA; Serial number: 0x6a683e9c519bcb53
- Valid from Tue Mar 05 13:09:48 CET 2013 until Fri Mar 03 13:09:48 CET 2023
- adding as trusted cert:
- Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1
- Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1
- Algorithm: RSA; Serial number: 0x5ec3b7a6437fa4e0
- Valid from Thu May 05 11:37:37 CEST 2011 until Tue Dec 31 10:37:37 CET 2030
- adding as trusted cert:
- Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x3c9131cb1ff6d01b0e9ab8d044bf12be
- Valid from Mon Jan 29 01:00:00 CET 1996 until Thu Aug 03 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=TC TrustCenter Class 3 CA II, OU=TC TrustCenter Class 3 CA, O=TC TrustCenter GmbH, C=DE
- Issuer: CN=TC TrustCenter Class 3 CA II, OU=TC TrustCenter Class 3 CA, O=TC TrustCenter GmbH, C=DE
- Algorithm: RSA; Serial number: 0x4a4700010002e5a05dd63f0051bf
- Valid from Thu Jan 12 15:41:57 CET 2006 until Wed Dec 31 23:59:59 CET 2025
- adding as trusted cert:
- Subject: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM
- Issuer: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM
- Algorithm: RSA; Serial number: 0x3ab6508b
- Valid from Mon Mar 19 19:33:33 CET 2001 until Wed Mar 17 19:33:33 CET 2021
- adding as trusted cert:
- Subject: CN=Buypass Class 2 CA 1, O=Buypass AS-983163327, C=NO
- Issuer: CN=Buypass Class 2 CA 1, O=Buypass AS-983163327, C=NO
- Algorithm: RSA; Serial number: 0x1
- Valid from Fri Oct 13 12:25:09 CEST 2006 until Thu Oct 13 12:25:09 CEST 2016
- adding as trusted cert:
- Subject: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO
- Issuer: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO
- Algorithm: RSA; Serial number: 0x2
- Valid from Tue Oct 26 10:28:58 CEST 2010 until Fri Oct 26 10:28:58 CEST 2040
- adding as trusted cert:
- Subject: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP
- Issuer: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP
- Algorithm: RSA; Serial number: 0x0
- Valid from Wed Jun 06 04:12:32 CEST 2007 until Sat Jun 06 04:12:32 CEST 2037
- adding as trusted cert:
- Subject: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US
- Issuer: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US
- Algorithm: EC; Serial number: 0x35fc265cd9844fc93d263d579baed756
- Valid from Mon Nov 05 01:00:00 CET 2007 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=ubuntu
- Issuer: CN=ubuntu
- Algorithm: RSA; Serial number: 0x96f6080db9aad3f6
- Valid from Wed Oct 05 08:14:13 CEST 2016 until Sat Oct 03 08:14:13 CEST 2026
- adding as trusted cert:
- Subject: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch
- Issuer: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch
- Algorithm: RSA; Serial number: 0xf2fa64e27463d38dfd101d041f76ca58
- Valid from Fri Jun 24 11:45:08 CEST 2011 until Wed Jun 25 10:45:08 CEST 2031
- adding as trusted cert:
- Subject: CN=NetLock Kozjegyzoi (Class A) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, ST=Hungary, C=HU
- Issuer: CN=NetLock Kozjegyzoi (Class A) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, ST=Hungary, C=HU
- Algorithm: RSA; Serial number: 0x103
- Valid from Thu Feb 25 00:14:47 CET 1999 until Wed Feb 20 00:14:47 CET 2019
- adding as trusted cert:
- Subject: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Issuer: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x401ac46421b31321030ebbe4121ac51d
- Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037
- adding as trusted cert:
- Subject: CN=China Internet Network Information Center EV Certificates Root, O=China Internet Network Information Center, C=CN
- Issuer: CN=China Internet Network Information Center EV Certificates Root, O=China Internet Network Information Center, C=CN
- Algorithm: RSA; Serial number: 0x489f0001
- Valid from Tue Aug 31 09:11:25 CEST 2010 until Sat Aug 31 09:11:25 CEST 2030
- adding as trusted cert:
- Subject: CN=Cybertrust Global Root, O="Cybertrust, Inc"
- Issuer: CN=Cybertrust Global Root, O="Cybertrust, Inc"
- Algorithm: RSA; Serial number: 0x400000000010f85aa2d48
- Valid from Fri Dec 15 09:00:00 CET 2006 until Wed Dec 15 09:00:00 CET 2021
- adding as trusted cert:
- Subject: OU=ApplicationCA, O=Japanese Government, C=JP
- Issuer: OU=ApplicationCA, O=Japanese Government, C=JP
- Algorithm: RSA; Serial number: 0x31
- Valid from Wed Dec 12 16:00:00 CET 2007 until Tue Dec 12 16:00:00 CET 2017
- adding as trusted cert:
- Subject: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: RSA; Serial number: 0x1
- Valid from Thu Jan 01 01:00:00 CET 2004 until Mon Jan 01 00:59:59 CET 2029
- adding as trusted cert:
- Subject: CN=Global Chambersign Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU
- Issuer: CN=Global Chambersign Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU
- Algorithm: RSA; Serial number: 0x0
- Valid from Tue Sep 30 18:14:18 CEST 2003 until Wed Sep 30 18:14:18 CEST 2037
- adding as trusted cert:
- Subject: OU=Trustis FPS Root CA, O=Trustis Limited, C=GB
- Issuer: OU=Trustis FPS Root CA, O=Trustis Limited, C=GB
- Algorithm: RSA; Serial number: 0x1b1fadb620f924d3366bf7c7f18ca059
- Valid from Tue Dec 23 13:14:06 CET 2003 until Sun Jan 21 12:36:54 CET 2024
- adding as trusted cert:
- Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue May 30 12:38:31 CEST 2000 until Sat May 30 12:38:31 CEST 2020
- adding as trusted cert:
- Subject: CN=NetLock Uzleti (Class B) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Issuer: CN=NetLock Uzleti (Class B) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU
- Algorithm: RSA; Serial number: 0x69
- Valid from Thu Feb 25 15:10:22 CET 1999 until Wed Feb 20 15:10:22 CET 2019
- adding as trusted cert:
- Subject: CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: RSA; Serial number: 0x4e812d8a8265e00b02ee3e350246e53d
- Valid from Fri Dec 01 01:00:00 CET 2006 until Tue Jan 01 00:59:59 CET 2030
- adding as trusted cert:
- Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4
- Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4
- Algorithm: EC; Serial number: 0x2a38a41c960a04de42b228a50be8349802
- Valid from Tue Nov 13 01:00:00 CET 2012 until Tue Jan 19 04:14:07 CET 2038
- adding as trusted cert:
- Subject: CN=AC Raíz Certicámara S.A., O=Sociedad Cameral de Certificación Digital - Certicámara S.A., C=CO
- Issuer: CN=AC Raíz Certicámara S.A., O=Sociedad Cameral de Certificación Digital - Certicámara S.A., C=CO
- Algorithm: RSA; Serial number: 0x77e52937be015e357f0698ccbec0c
- Valid from Mon Nov 27 21:46:29 CET 2006 until Tue Apr 02 23:42:02 CEST 2030
- adding as trusted cert:
- Subject: [email protected], CN=EE Certification Centre Root CA, O=AS Sertifitseerimiskeskus, C=EE
- Issuer: [email protected], CN=EE Certification Centre Root CA, O=AS Sertifitseerimiskeskus, C=EE
- Algorithm: RSA; Serial number: 0x5480f9a073ed3f004cca89d8e371e64a
- Valid from Sat Oct 30 12:10:30 CEST 2010 until Wed Dec 18 00:59:59 CET 2030
- adding as trusted cert:
- Subject: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
- Issuer: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
- Algorithm: RSA; Serial number: 0xc9cdd3e9d57d23ce
- Valid from Fri Aug 01 14:31:40 CEST 2008 until Sat Jul 31 14:31:40 CEST 2038
- adding as trusted cert:
- Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
- Algorithm: RSA; Serial number: 0x4caaf9cadb636fe01ff74ed85b03869d
- Valid from Tue Jan 19 01:00:00 CET 2010 until Tue Jan 19 00:59:59 CET 2038
- adding as trusted cert:
- Subject: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
- Issuer: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
- Algorithm: RSA; Serial number: 0x600197b746a7eab4b49ad64b2ff790fb
- Valid from Wed Apr 02 02:00:00 CEST 2008 until Wed Dec 02 00:59:59 CET 2037
- adding as trusted cert:
- Subject: OU=RSA Security 2048 V3, O=RSA Security Inc
- Issuer: OU=RSA Security 2048 V3, O=RSA Security Inc
- Algorithm: RSA; Serial number: 0xa0101010000027c0000000a00000002
- Valid from Thu Feb 22 21:39:23 CET 2001 until Sun Feb 22 21:39:23 CET 2026
- adding as trusted cert:
- Subject: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US
- Issuer: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US
- Algorithm: EC; Serial number: 0x7497258ac73f7a54
- Valid from Fri Jan 29 15:20:24 CET 2010 until Mon Dec 31 15:20:24 CET 2040
- adding as trusted cert:
- Subject: CN=Staat der Nederlanden Root CA - G2, O=Staat der Nederlanden, C=NL
- Issuer: CN=Staat der Nederlanden Root CA - G2, O=Staat der Nederlanden, C=NL
- Algorithm: RSA; Serial number: 0x98968c
- Valid from Wed Mar 26 12:18:17 CET 2008 until Wed Mar 25 12:03:10 CET 2020
- adding as trusted cert:
- Subject: CN=Sonera Class1 CA, O=Sonera, C=FI
- Issuer: CN=Sonera Class1 CA, O=Sonera, C=FI
- Algorithm: RSA; Serial number: 0x24
- Valid from Fri Apr 06 12:49:13 CEST 2001 until Tue Apr 06 12:49:13 CEST 2021
- adding as trusted cert:
- Subject: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE
- Issuer: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Wed Oct 01 12:40:14 CEST 2008 until Sun Oct 02 01:59:59 CEST 2033
- adding as trusted cert:
- Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US
- Algorithm: RSA; Serial number: 0x4cc7eaaa983e71d39310f83d3a899192
- Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST 2028
- adding as trusted cert:
- Subject: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
- Issuer: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US
- Algorithm: RSA; Serial number: 0x33af1e6a711a9a0bb2864b11d09fae5
- Valid from Thu Aug 01 14:00:00 CEST 2013 until Fri Jan 15 13:00:00 CET 2038
- adding as trusted cert:
- Subject: C=ES, O=EDICOM, OU=PKI, CN=ACEDICOM Root
- Issuer: C=ES, O=EDICOM, OU=PKI, CN=ACEDICOM Root
- Algorithm: RSA; Serial number: 0x618dc7863b018205
- Valid from Fri Apr 18 18:24:22 CEST 2008 until Thu Apr 13 18:24:22 CEST 2028
- trigger seeding of SecureRandom
- done seeding SecureRandom
- Using SSLEngineImpl.
- 09:48:59.038 [CamelJettyWebSocketServer-30-acceptor-0@5d99c6b5-ServerConnector@7354b8c5{SSL-HTTP/1.1}{localhost:9292}] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectorManager$ManagedSelector$Accept@6eff905
- 09:48:59.048 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 0/0 selected
- 09:48:59.048 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectorManager$ManagedSelector$Accept@6eff905
- 09:48:59.074 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractEndPoint - onOpen SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,20/30000,null}{io=0,kio=0,kro=0}
- 09:48:59.075 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.IdleTimeout - SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,22/30000,null}{io=0,kio=0,kro=0} idle timeout check, elapsed: 22 ms, remaining: 29978 ms
- Using SSLEngineImpl.
- 09:48:59.099 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLEngine [5e02ee4d[SSLEngine[hostname=127.0.0.1 port=56308] SSL_NULL_WITH_NULL_NULL]] created from SSLContext [javax.net.ssl.SSLContext@4dd6fd0a].
- 09:48:59.101 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [5e02ee4d[SSLEngine[hostname=127.0.0.1 port=56308] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set cipher suites [null],
- cipher suite patterns [null],
- available cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]],
- currently enabled cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]],
- and default cipher suite patterns [Patterns [includes=[.*], excludes=[.*_NULL_.*, .*_anon_.*, .*_EXPORT_.*, .*_DES_.*]]].
- Resulting enabled cipher suites are [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]].
- 09:48:59.102 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [5e02ee4d[SSLEngine[hostname=127.0.0.1 port=56308] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set protocols [null],
- protocol patterns [null],
- available protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- currently enabled protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- and default protocol patterns [Patterns [includes=[.*], excludes=[SSL.*]]].
- Resulting enabled protocols are [[TLSv1, TLSv1.1, TLSv1.2]].
- 09:48:59.102 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring client-auth on SSLEngine [5e02ee4d[SSLEngine[hostname=127.0.0.1 port=56308] SSL_NULL_WITH_NULL_NULL]] to [REQUIRE].
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
- %% No cached client session
- 09:48:59.130 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.IdleTimeout - DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,null}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,78/30000,null}{io=0,kio=0,kro=0} idle timeout check, elapsed: 3 ms, remaining: 29997 ms
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1477381739 bytes = { 14, 181, 153, 197, 108, 215, 75, 52, 251, 85, 52, 43, 225, 41, 241, 103, 133, 96, 51, 157, 58, 174, 247, 2, 197, 85, 230, 6 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- New I/O worker #1, WRITE: TLSv1.2 Handshake, length = 235
- 09:48:59.202 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.server.HttpChannel - new HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=} -> DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,76/30000,null}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,150/30000,null}{io=0,kio=0,kro=0},null,HttpChannelState@5dc1980{s=IDLE i=true a=null}
- 09:48:59.212 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.server.HttpConnection - New HTTP Connection HttpConnection@714329d9[IDLE,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,83/30000,null}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,159/30000,null}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
- 09:48:59.224 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - onOpen SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[IDLE,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,91/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,165/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.224 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - onOpen HttpConnection@714329d9[IDLE,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,98/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,172/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.229 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested HttpConnection@714329d9[IDLE,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,103/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.229 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - IDLE-->FILL_INTERESTED HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,103/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.230 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,178/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.230 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - IDLE-->FILL_INTERESTED SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,178/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Local interests updating 0 -> 1 for SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,SslConnection}{io=1,kio=0,kro=0}
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Created SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,SslConnection}{io=1,kio=0,kro=0}
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Key interests updated 0 -> 1 on SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,SslConnection}{io=1,kio=1,kro=0}
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 09:48:59.231 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 1/1 selected
- 09:48:59.232 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Key interests updated 1 -> 0 on SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,1/30000,SslConnection}{io=1,kio=0,kro=1}
- 09:48:59.232 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Local interests updating 1 -> 0 for SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,1/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.232 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.232 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILL_INTERESTED-->FILLING SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,2/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.233 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.ssl.SslConnection - onFillable enter DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,2/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.233 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILL_INTERESTED-->FILLING HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.234 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.ssl.SslConnection - onFillable exit DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.234 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING-->IDLE SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.235 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.235 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 09:48:59.236 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.server.HttpConnection - HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,5/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] onFillable HttpChannelState@5dc1980{s=IDLE i=true a=null}
- 09:48:59.236 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,6/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,5/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] fill enter
- 09:48:59.237 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 240 SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,6/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.237 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=240/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,7/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,0/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] filled 240 encrypted bytes
- CamelJettyWebSocketServer-32, READ: TLSv1.2 Handshake, length = 235
- 09:48:59.239 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_TASK,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,9/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] unwrap Status = OK HandshakeStatus = NEED_TASK
- bytesConsumed = 240 bytesProduced = 0
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1477381739 bytes = { 14, 181, 153, 197, 108, 215, 75, 52, 251, 85, 52, 43, 225, 41, 241, 103, 133, 96, 51, 157, 58, 174, 247, 2, 197, 85, 230, 6 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- %% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL]
- matching alias: server
- %% Negotiating: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1477381739 bytes = { 90, 48, 55, 35, 56, 5, 5, 251, 33, 106, 228, 180, 171, 160, 1, 42, 138, 92, 59, 188, 79, 16, 215, 208, 142, 150, 178, 200 }
- Session ID: {88, 15, 14, 107, 213, 193, 253, 95, 194, 76, 45, 69, 221, 232, 211, 207, 251, 5, 152, 6, 206, 82, 85, 47, 49, 194, 83, 40, 187, 52, 204, 234}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=Test Server, OU=MyDepartment, O=MyCompany, L=Munich, ST=Bavaria, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 19697468346206325338625931027401620685505412743602335229201285324147237256216294710834287613270808792700765169197171367371459991031662084309764776191914171160104989266207613238184784158415975037177065022201531172433794931849866898549526682368884371139417838799836320672154199909478730633522432282118939559532307066108447566990979134741165253612506513491626459651819946324249745973578011579650517987718802720162457248935339641095429277723082345377268006775487733517858798408645354401260091015110745708667097965877142342305591846833532604648462225727819942287641383438004739414038605341137460966856052237012367021734999
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:37:42 CEST 2016,
- To: Thu Oct 25 09:37:42 CEST 2018]
- Issuer: CN=Test SubCA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 6
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [3]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [4]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [5]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- ]
- [6]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 7F 45 12 3E F5 17 F8 EF FF 2F 08 46 25 4B 21 60 .E.>...../.F%K!`
- 0010: EB FC 1B 4F ...O
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 1E 7F 87 DF 07 84 86 AC 03 B3 3A 11 F4 D1 18 56 ..........:....V
- 0010: C2 77 73 73 54 A8 F4 6C 4F 7F 8D 6C DA 68 16 0D .wssT..lO..l.h..
- 0020: 43 78 DE 52 7C BF 47 55 0C 3B BF B2 BC 95 61 51 Cx.R..GU.;....aQ
- 0030: 0F A0 EE 3A 9D 0C 4D B4 ED AC 24 A5 87 6A B6 7E ...:..M...$..j..
- 0040: FB CD 44 A4 54 6B CA 48 66 27 6B 85 99 33 38 AF ..D.Tk.Hf'k..38.
- 0050: FF B5 04 8C D2 FD 7F CF BA 26 B0 52 58 F8 69 C0 .........&.RX.i.
- 0060: 0A C2 94 CA EA 34 F2 65 4D 88 5E 96 16 85 61 AC .....4.eM.^...a.
- 0070: 6A 9A B9 D8 6F 4A 34 5B C8 A1 D6 CA 90 B8 1A D9 j...oJ4[........
- 0080: 9B DF E3 C3 63 19 83 93 E7 C2 63 FE A5 74 EF 56 ....c.....c..t.V
- 0090: DD 9C 85 E8 5E CF 8A 5B C1 EB 22 F7 61 CB 69 54 ....^..[..".a.iT
- 00A0: 45 77 70 94 02 D5 92 23 37 14 21 17 3D E5 E4 FE Ewp....#7.!.=...
- 00B0: 1B 89 7D DE 9B 86 14 C1 77 54 C7 D9 59 9A E3 B6 ........wT..Y...
- 00C0: 27 C3 B7 94 FE 6B 3E 09 9E 79 7B 94 D3 5A 89 88 '....k>..y...Z..
- 00D0: AE C4 F9 C2 9A 29 FF 7C C3 E3 39 97 19 AA 4C E6 .....)....9...L.
- 00E0: 11 0A F8 C4 AC 86 42 77 09 54 2E F3 6B 25 65 16 ......Bw.T..k%e.
- 00F0: DC B8 E0 C7 E9 E4 BE 7D AC FE 63 BB AD 4F 9E 28 ..........c..O.(
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 26631545169559909230644768517141423752587936995376103841916319711589604204657412965085012857613884736340404856156055730865366293452487088032192693197115272441309759692119853059588457702024310176286735623930806732223217746707553162920026328869975003955119995376544166185370171169754372937503191991895430322266330639043068107814272353729016677147704110258330738274123675092182231270336660156341013822146156531604782194936726777505454634586992024194343729864238470993219746161883279675292359116443207963682462389190768365005135861009362967140179446538991559245820502973316731788494182116238178045967298158538348480713037
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Wed Oct 23 09:36:19 CEST 2024]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 91 86 4A DF ED 72 4C 30 E0 86 D2 12 BC 82 DB 73 ..J..rL0.......s
- 0010: 73 A7 DC 1A 51 B7 68 9B 1F 20 58 A3 6D 5F 53 6F s...Q.h.. X.m_So
- 0020: 42 12 D5 C1 5C 82 D1 E8 CA 47 61 45 A7 BD B3 60 B...\....GaE...`
- 0030: 92 01 0C 90 08 C3 15 FE E8 9F EF 85 C0 13 38 25 ..............8%
- 0040: 9B 5A 71 D8 3F 2D 0C 06 FC A3 EC 7E 99 88 4F 77 .Zq.?-........Ow
- 0050: 95 8A 44 63 48 9D 3A 30 22 54 73 25 96 66 1F 23 ..DcH.:0"Ts%.f.#
- 0060: 17 A8 D6 A5 F3 59 2F 41 87 DE 34 7F 12 98 BA AD .....Y/A..4.....
- 0070: 6F ED B8 B6 6E 2C C2 0C E7 78 39 E4 63 58 90 83 o...n,...x9.cX..
- 0080: 2B C7 EA DF 27 61 BA 57 9D D9 82 51 F0 0D 00 5E +...'a.W...Q...^
- 0090: BA 03 32 9D 51 A2 69 D4 A7 A3 5B 17 9D 3F F0 0E ..2.Q.i...[..?..
- 00A0: E7 4B CD 3E 6C 83 D4 3A 2C FE 33 9A E3 F3 2C CA .K.>l..:,.3...,.
- 00B0: EE 6A 12 01 54 73 C0 7E 69 A1 21 CA 5E 1D FB 0F .j..Ts..i.!.^...
- 00C0: E2 1B 46 4E 9F E3 4F DD BD 86 F3 8A E4 BA 68 F1 ..FN..O.......h.
- 00D0: 30 E7 A7 1B CA A7 90 68 0C 0A 51 62 40 8E 5D 77 0......h..Qb@.]w
- 00E0: 47 2F 1D F3 6D 6A 5D C8 52 D8 30 D7 A4 E3 C0 6F G/..mj].R.0....o
- 00F0: EA B2 75 99 88 31 4E 35 96 FF 20 FA AD 15 24 6B ..u..1N5.. ...$k
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
- Key: Sun RSA public key, 2048 bits
- modulus: 21614797379343951874063560426666435817765804479254937174344617783446070293504573872083026160705569565210812742004667604650861924545507924869082180535728855063107699051629520028088509890238676139784840816403038623216715215937709028135784989878225131123560489367685617129784581943689922756036136019263207604359599950402845747582709049931050550113248498210094031108669553570309004666029329989061171507007407888466064368567345515996525419672802677026087475471995473656928759075978348832385752404966781376484507135996003989017552715979352721517675529496859338972037423806416908469445902511278769181221473628003736339491043
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Mon Oct 20 09:36:19 CEST 2036]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ b325e3cb 741b928f]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- Non_repudiation
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- ]
- Algorithm: [SHA1withRSA]
- Signature:
- 0000: 47 FE 9A A4 A6 2D DC 77 09 5E 87 FB 7D 7E 15 10 G....-.w.^......
- 0010: 51 07 70 DC 3B D8 5C B8 07 0B 77 7C A6 AF 35 7A Q.p.;.\...w...5z
- 0020: 0D 02 03 6B 17 0F 0D 47 A2 22 68 CA C7 50 7E D4 ...k...G."h..P..
- 0030: C3 2A 52 56 85 E4 50 1E 45 94 2E C2 2B 20 8B AC .*RV..P.E...+ ..
- 0040: 6F F5 AB 2A 32 D1 E8 ED 18 41 16 86 06 B2 C8 44 o..*2....A.....D
- 0050: 61 56 57 EE B2 40 E1 B6 24 A5 4D 52 F7 FF AF 7B aVW..@..$.MR....
- 0060: 8A EE B1 D8 47 8A BD F8 E0 86 35 2D EC 8C 6F EE ....G.....5-..o.
- 0070: D3 F2 ED 58 83 B9 B3 69 31 8D 6A 0C 6B A9 8A E8 ...X...i1.j.k...
- 0080: 74 F4 AC 92 66 AF C2 55 FC 85 40 E6 5A 6B 44 B2 [email protected].
- 0090: CB A2 1F DE 0B EA CC B3 CE 08 3F B5 64 72 32 82 ..........?.dr2.
- 00A0: C4 8F 96 DB 3E 93 A1 05 E7 6C 04 45 18 C2 2C CD ....>....l.E..,.
- 00B0: BE 36 06 1B BD 7D 35 E8 A4 C2 00 2C 0E F2 B7 87 .6....5....,....
- 00C0: 10 2E BF 27 54 26 78 4E 2D 3F 6A 4F 2E 44 17 C0 ...'T&xN-?jO.D..
- 00D0: CE 3D 43 B1 CA 97 2F DF ED 0E D4 70 2F 4F F4 D5 .=C.../....p/O..
- 00E0: 36 AE 35 4E C5 2E 04 1A 6E 38 4D F6 67 33 26 7C 6.5N....n8M.g3&.
- 00F0: 09 9A 1A C9 57 35 90 97 7B B4 6A CC 82 E8 2F 4E ....W5....j.../N
- ]
- ***
- *** ECDH ServerKeyExchange
- Signature Algorithm SHA512withRSA
- Server key: Sun EC public key, 256 bits
- public x coord: 92946486631554197751163667211848638664421548785456152963327956433035095804772
- public y coord: 46136917158036464784251489091793050106193259960951927950464697941919844839915
- parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
- *** CertificateRequest
- Cert Types: RSA, DSS, ECDSA
- Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Cert Authorities:
- <CN=Test Root CA 2016, O=Company, C=DE>
- <CN=Test SubCA 2016, O=Company, C=DE>
- *** ServerHelloDone
- CamelJettyWebSocketServer-32, WRITE: TLSv1.2 Handshake, length = 3269
- 09:48:59.418 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_WRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,187/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,180/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] unwrap Status = OK HandshakeStatus = NEED_WRAP
- bytesConsumed = 0 bytesProduced = 0
- 09:48:59.418 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_WRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,188/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,181/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] flush enter [java.nio.HeapByteBuffer[pos=0 lim=0 cap=0]]
- 09:48:59.419 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/3274,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,188/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,181/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] wrap Status = OK HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 3274
- 09:48:59.424 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,194/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,187/30000,SslConnection}{io=0,kio=0,kro=1} OK HeapByteBuffer@24a3a6a0[p=0,l=3274,c=17408,r=3274]={<<<\x16\x03\x03\x0c\xC5\x02\x00\x00M\x03\x03X\x0f\x0ekZ0... SubCA 2016\x0e\x00\x00\x00>>>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00...\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00}
- 09:48:59.425 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ChannelEndPoint - flushed 3274 SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,187/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.425 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/0,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,195/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,0/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] flush exit, consumed 0
- 09:48:59.425 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,195/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,0/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 09:48:59.426 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 0 SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.426 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,196/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] filled 0 encrypted bytes
- 09:48:59.426 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,196/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 09:48:59.427 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,196/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] fill exit
- 09:48:59.427 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,197/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] fill enter
- 09:48:59.427 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 0 SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}
- 09:48:59.428 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,197/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,2/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] filled 0 encrypted bytes
- 09:48:59.428 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,198/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 09:48:59.428 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,198/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,3/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}] fill exit
- 09:48:59.428 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.http.HttpParser - parseNext s=START HeapByteBuffer@7da3765d[p=0,l=0,c=17408,r=0]={<<<>>>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00...\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00}
- 09:48:59.429 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested HttpConnection@714329d9[FILLING,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,199/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.429 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING-->FILLING_FILL_INTERESTED HttpConnection@714329d9[FILLING_FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,199/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.429 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING_FILL_INTERESTED-->FILL_INTERESTED HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,-,-,199/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.430 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,4/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.430 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.AbstractConnection - IDLE-->FILL_INTERESTED SslConnection@6e4f17c0{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@714329d9[FILL_INTERESTED,DecryptedEndPoint@4949af10{/127.0.0.1:56308<->9292,Open,in,out,R,-,1/30000,HttpConnection}->SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,-,-,5/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@642e0f62{r=0,c=false,a=IDLE,uri=}]
- 09:48:59.430 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Local interests updating 0 -> 1 for SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,0/30000,SslConnection}{io=1,kio=0,kro=1}
- 09:48:59.430 [CamelJettyWebSocketServer-32] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.430 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 0/1 selected
- 09:48:59.431 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectChannelEndPoint$1@3d822eeb
- 09:48:59.431 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Key interests updated 0 -> 1 on SelectChannelEndPoint@1b44e362{/127.0.0.1:56308<->9292,Open,in,out,R,-,1/30000,SslConnection}{io=1,kio=1,kro=1}
- 09:48:59.431 [CamelJettyWebSocketServer-28-selector-ServerConnectorManager@4ef782af/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- New I/O worker #1, READ: TLSv1.2 Handshake, length = 3269
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1477381739 bytes = { 90, 48, 55, 35, 56, 5, 5, 251, 33, 106, 228, 180, 171, 160, 1, 42, 138, 92, 59, 188, 79, 16, 215, 208, 142, 150, 178, 200 }
- Session ID: {88, 15, 14, 107, 213, 193, 253, 95, 194, 76, 45, 69, 221, 232, 211, 207, 251, 5, 152, 6, 206, 82, 85, 47, 49, 194, 83, 40, 187, 52, 204, 234}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- %% Initialized: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- ** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=Test Server, OU=MyDepartment, O=MyCompany, L=Munich, ST=Bavaria, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 19697468346206325338625931027401620685505412743602335229201285324147237256216294710834287613270808792700765169197171367371459991031662084309764776191914171160104989266207613238184784158415975037177065022201531172433794931849866898549526682368884371139417838799836320672154199909478730633522432282118939559532307066108447566990979134741165253612506513491626459651819946324249745973578011579650517987718802720162457248935339641095429277723082345377268006775487733517858798408645354401260091015110745708667097965877142342305591846833532604648462225727819942287641383438004739414038605341137460966856052237012367021734999
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:37:42 CEST 2016,
- To: Thu Oct 25 09:37:42 CEST 2018]
- Issuer: CN=Test SubCA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 6
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [3]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [4]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [5]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- ]
- [6]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 7F 45 12 3E F5 17 F8 EF FF 2F 08 46 25 4B 21 60 .E.>...../.F%K!`
- 0010: EB FC 1B 4F ...O
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 1E 7F 87 DF 07 84 86 AC 03 B3 3A 11 F4 D1 18 56 ..........:....V
- 0010: C2 77 73 73 54 A8 F4 6C 4F 7F 8D 6C DA 68 16 0D .wssT..lO..l.h..
- 0020: 43 78 DE 52 7C BF 47 55 0C 3B BF B2 BC 95 61 51 Cx.R..GU.;....aQ
- 0030: 0F A0 EE 3A 9D 0C 4D B4 ED AC 24 A5 87 6A B6 7E ...:..M...$..j..
- 0040: FB CD 44 A4 54 6B CA 48 66 27 6B 85 99 33 38 AF ..D.Tk.Hf'k..38.
- 0050: FF B5 04 8C D2 FD 7F CF BA 26 B0 52 58 F8 69 C0 .........&.RX.i.
- 0060: 0A C2 94 CA EA 34 F2 65 4D 88 5E 96 16 85 61 AC .....4.eM.^...a.
- 0070: 6A 9A B9 D8 6F 4A 34 5B C8 A1 D6 CA 90 B8 1A D9 j...oJ4[........
- 0080: 9B DF E3 C3 63 19 83 93 E7 C2 63 FE A5 74 EF 56 ....c.....c..t.V
- 0090: DD 9C 85 E8 5E CF 8A 5B C1 EB 22 F7 61 CB 69 54 ....^..[..".a.iT
- 00A0: 45 77 70 94 02 D5 92 23 37 14 21 17 3D E5 E4 FE Ewp....#7.!.=...
- 00B0: 1B 89 7D DE 9B 86 14 C1 77 54 C7 D9 59 9A E3 B6 ........wT..Y...
- 00C0: 27 C3 B7 94 FE 6B 3E 09 9E 79 7B 94 D3 5A 89 88 '....k>..y...Z..
- 00D0: AE C4 F9 C2 9A 29 FF 7C C3 E3 39 97 19 AA 4C E6 .....)....9...L.
- 00E0: 11 0A F8 C4 AC 86 42 77 09 54 2E F3 6B 25 65 16 ......Bw.T..k%e.
- 00F0: DC B8 E0 C7 E9 E4 BE 7D AC FE 63 BB AD 4F 9E 28 ..........c..O.(
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=Test SubCA 2016, O=Company, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 26631545169559909230644768517141423752587936995376103841916319711589604204657412965085012857613884736340404856156055730865366293452487088032192693197115272441309759692119853059588457702024310176286735623930806732223217746707553162920026328869975003955119995376544166185370171169754372937503191991895430322266330639043068107814272353729016677147704110258330738274123675092182231270336660156341013822146156531604782194936726777505454634586992024194343729864238470993219746161883279675292359116443207963682462389190768365005135861009362967140179446538991559245820502973316731788494182116238178045967298158538348480713037
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Wed Oct 23 09:36:19 CEST 2024]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: A5 55 EC 7E AC F0 98 95 EA 58 D7 BF 43 92 2C 65 .U.......X..C.,e
- 0010: AA A0 32 73 ..2s
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 91 86 4A DF ED 72 4C 30 E0 86 D2 12 BC 82 DB 73 ..J..rL0.......s
- 0010: 73 A7 DC 1A 51 B7 68 9B 1F 20 58 A3 6D 5F 53 6F s...Q.h.. X.m_So
- 0020: 42 12 D5 C1 5C 82 D1 E8 CA 47 61 45 A7 BD B3 60 B...\....GaE...`
- 0030: 92 01 0C 90 08 C3 15 FE E8 9F EF 85 C0 13 38 25 ..............8%
- 0040: 9B 5A 71 D8 3F 2D 0C 06 FC A3 EC 7E 99 88 4F 77 .Zq.?-........Ow
- 0050: 95 8A 44 63 48 9D 3A 30 22 54 73 25 96 66 1F 23 ..DcH.:0"Ts%.f.#
- 0060: 17 A8 D6 A5 F3 59 2F 41 87 DE 34 7F 12 98 BA AD .....Y/A..4.....
- 0070: 6F ED B8 B6 6E 2C C2 0C E7 78 39 E4 63 58 90 83 o...n,...x9.cX..
- 0080: 2B C7 EA DF 27 61 BA 57 9D D9 82 51 F0 0D 00 5E +...'a.W...Q...^
- 0090: BA 03 32 9D 51 A2 69 D4 A7 A3 5B 17 9D 3F F0 0E ..2.Q.i...[..?..
- 00A0: E7 4B CD 3E 6C 83 D4 3A 2C FE 33 9A E3 F3 2C CA .K.>l..:,.3...,.
- 00B0: EE 6A 12 01 54 73 C0 7E 69 A1 21 CA 5E 1D FB 0F .j..Ts..i.!.^...
- 00C0: E2 1B 46 4E 9F E3 4F DD BD 86 F3 8A E4 BA 68 F1 ..FN..O.......h.
- 00D0: 30 E7 A7 1B CA A7 90 68 0C 0A 51 62 40 8E 5D 77 0......h..Qb@.]w
- 00E0: 47 2F 1D F3 6D 6A 5D C8 52 D8 30 D7 A4 E3 C0 6F G/..mj].R.0....o
- 00F0: EA B2 75 99 88 31 4E 35 96 FF 20 FA AD 15 24 6B ..u..1N5.. ...$k
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=Test Root CA 2016, O=Company, C=DE
- Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
- Key: Sun RSA public key, 2048 bits
- modulus: 21614797379343951874063560426666435817765804479254937174344617783446070293504573872083026160705569565210812742004667604650861924545507924869082180535728855063107699051629520028088509890238676139784840816403038623216715215937709028135784989878225131123560489367685617129784581943689922756036136019263207604359599950402845747582709049931050550113248498210094031108669553570309004666029329989061171507007407888466064368567345515996525419672802677026087475471995473656928759075978348832385752404966781376484507135996003989017552715979352721517675529496859338972037423806416908469445902511278769181221473628003736339491043
- public exponent: 65537
- Validity: [From: Tue Oct 25 09:36:19 CEST 2016,
- To: Mon Oct 20 09:36:19 CEST 2036]
- Issuer: CN=Test Root CA 2016, O=Company, C=DE
- SerialNumber: [ b325e3cb 741b928f]
- Certificate Extensions: 4
- [1]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- [2]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [3]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- Non_repudiation
- Key_CertSign
- Crl_Sign
- ]
- [4]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 54 86 D8 2C 2D D8 33 46 B1 E8 19 F8 42 36 BE F7 T..,-.3F....B6..
- 0010: DE BF 01 B4 ....
- ]
- ]
- ]
- Algorithm: [SHA1withRSA]
- Signature:
- 0000: 47 FE 9A A4 A6 2D DC 77 09 5E 87 FB 7D 7E 15 10 G....-.w.^......
- 0010: 51 07 70 DC 3B D8 5C B8 07 0B 77 7C A6 AF 35 7A Q.p.;.\...w...5z
- 0020: 0D 02 03 6B 17 0F 0D 47 A2 22 68 CA C7 50 7E D4 ...k...G."h..P..
- 0030: C3 2A 52 56 85 E4 50 1E 45 94 2E C2 2B 20 8B AC .*RV..P.E...+ ..
- 0040: 6F F5 AB 2A 32 D1 E8 ED 18 41 16 86 06 B2 C8 44 o..*2....A.....D
- 0050: 61 56 57 EE B2 40 E1 B6 24 A5 4D 52 F7 FF AF 7B aVW..@..$.MR....
- 0060: 8A EE B1 D8 47 8A BD F8 E0 86 35 2D EC 8C 6F EE ....G.....5-..o.
- 0070: D3 F2 ED 58 83 B9 B3 69 31 8D 6A 0C 6B A9 8A E8 ...X...i1.j.k...
- 0080: 74 F4 AC 92 66 AF C2 55 FC 85 40 E6 5A 6B 44 B2 [email protected].
- 0090: CB A2 1F DE 0B EA CC B3 CE 08 3F B5 64 72 32 82 ..........?.dr2.
- 00A0: C4 8F 96 DB 3E 93 A1 05 E7 6C 04 45 18 C2 2C CD ....>....l.E..,.
- 00B0: BE 36 06 1B BD 7D 35 E8 A4 C2 00 2C 0E F2 B7 87 .6....5....,....
- 00C0: 10 2E BF 27 54 26 78 4E 2D 3F 6A 4F 2E 44 17 C0 ...'T&xN-?jO.D..
- 00D0: CE 3D 43 B1 CA 97 2F DF ED 0E D4 70 2F 4F F4 D5 .=C.../....p/O..
- 00E0: 36 AE 35 4E C5 2E 04 1A 6E 38 4D F6 67 33 26 7C 6.5N....n8M.g3&.
- 00F0: 09 9A 1A C9 57 35 90 97 7B B4 6A CC 82 E8 2F 4E ....W5....j.../N
- ]
- ***
- New I/O worker #1, fatal error: 46: General SSLEngine problem
- sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- %% Invalidated: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- New I/O worker #1, SEND TLSv1.2 ALERT: fatal, description = certificate_unknown
- New I/O worker #1, WRITE: TLSv1.2 Alert, length = 2
- New I/O worker #1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- New I/O worker #1, called closeOutbound()
- New I/O worker #1, closeOutboundInternal()
- New I/O worker #1, called closeInbound()
- New I/O worker #1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Inbound closed before receiving peer's close_notify: possible truncation attack?
- 09:48:59.585 [New I/O worker #1] DEBUG com.ning.http.client.providers.netty.request.NettyConnectListener - Trying to recover from failing to connect channel [id: 0xc805c778, /127.0.0.1:56308 => localhost/127.0.0.1:9292] with a retry value of true
- javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1431) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:535) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:813) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:781) ~[?:1.8.0_91]
- at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1218) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.decode(SslHandler.java:852) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.codec.frame.FrameDecoder.callDecode(FrameDecoder.java:425) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.codec.frame.FrameDecoder.messageReceived(FrameDecoder.java:310) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.SimpleChannelUpstreamHandler.handleUpstream(SimpleChannelUpstreamHandler.java:70) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(DefaultChannelPipeline.java:564) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(DefaultChannelPipeline.java:559) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:268) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:255) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.NioWorker.read(NioWorker.java:88) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioWorker.process(AbstractNioWorker.java:108) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioSelector.run(AbstractNioSelector.java:337) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioWorker.run(AbstractNioWorker.java:89) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.NioWorker.run(NioWorker.java:178) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.util.ThreadRenamingRunnable.run(ThreadRenamingRunnable.java:108) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.util.internal.DeadLockProofWorker$1.run(DeadLockProofWorker.java:42) [netty-3.10.5.Final.jar:?]
- at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [?:1.8.0_91]
- at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [?:1.8.0_91]
- at java.lang.Thread.run(Thread.java:745) [?:1.8.0_91]
- Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:192) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1728) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:304) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1509) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) [netty-3.10.5.Final.jar:?]
- ... 18 more
- Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:387) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292) ~[?:1.8.0_91]
- at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1496) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
- Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) ~[?:1.8.0_91]
- at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) ~[?:1.8.0_91]
- at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:382) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292) ~[?:1.8.0_91]
- at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1496) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
- 09:48:59.591 [New I/O worker #1] DEBUG com.ning.http.client.providers.netty.request.NettyConnectListener - Failed to recover from connect exception: javax.net.ssl.SSLHandshakeException: General SSLEngine problem with channel [id: 0xc805c778, /127.0.0.1:56308 => localhost/127.0.0.1:9292]
- 09:48:59.591 [New I/O worker #1] DEBUG de.tst.camel.test.client.testPListener - websocket on error
- java.net.ConnectException: General SSLEngine problem
- at com.ning.http.client.providers.netty.request.NettyConnectListener.onFutureFailure(NettyConnectListener.java:133) [async-http-client-1.9.31.jar:?]
- at com.ning.http.client.providers.netty.request.NettyConnectListener.access$200(NettyConnectListener.java:37) [async-http-client-1.9.31.jar:?]
- at com.ning.http.client.providers.netty.request.NettyConnectListener$1.operationComplete(NettyConnectListener.java:104) [async-http-client-1.9.31.jar:?]
- at org.jboss.netty.channel.DefaultChannelFuture.notifyListener(DefaultChannelFuture.java:409) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelFuture.notifyListeners(DefaultChannelFuture.java:395) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelFuture.setFailure(DefaultChannelFuture.java:362) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.setHandshakeFailure(SslHandler.java:1460) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1314) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.decode(SslHandler.java:852) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.codec.frame.FrameDecoder.callDecode(FrameDecoder.java:425) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.codec.frame.FrameDecoder.messageReceived(FrameDecoder.java:310) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.SimpleChannelUpstreamHandler.handleUpstream(SimpleChannelUpstreamHandler.java:70) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(DefaultChannelPipeline.java:564) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(DefaultChannelPipeline.java:559) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:268) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:255) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.NioWorker.read(NioWorker.java:88) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioWorker.process(AbstractNioWorker.java:108) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioSelector.run(AbstractNioSelector.java:337) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.AbstractNioWorker.run(AbstractNioWorker.java:89) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.channel.socket.nio.NioWorker.run(NioWorker.java:178) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.util.ThreadRenamingRunnable.run(ThreadRenamingRunnable.java:108) [netty-3.10.5.Final.jar:?]
- at org.jboss.netty.util.internal.DeadLockProofWorker$1.run(DeadLockProofWorker.java:42) [netty-3.10.5.Final.jar:?]
- at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [?:1.8.0_91]
- at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [?:1.8.0_91]
- at java.lang.Thread.run(Thread.java:745) [?:1.8.0_91]
- Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1431) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:535) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:813) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:781) ~[?:1.8.0_91]
- at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1218) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
- Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:192) ~[?:1.8.0_91]
- at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1728) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:304) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1509) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
- Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:387) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292) ~[?:1.8.0_91]
- at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1496) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
- Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) ~[?:1.8.0_91]
- at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) ~[?:1.8.0_91]
- at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:382) ~[?:1.8.0_91]
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292) ~[?:1.8.0_91]
- at sun.security.validator.Validator.validate(Validator.java:260) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281) ~[?:1.8.0_91]
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1496) ~[?:1.8.0_91]
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:919) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$1.run(Handshaker.java:916) ~[?:1.8.0_91]
- at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_91]
- at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1369) ~[?:1.8.0_91]
- at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1392) ~[netty-3.10.5.Final.jar:?]
- at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1255) ~[netty-3.10.5.Final.jar:?]
- ... 18 more
Advertisement
Add Comment
Please, Sign In to add comment