Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ gnutls-cli -d 5 arteptweb-a.akamaihd.net -p 443
- |<2>| Initializing PKCS #11 modules
- |<2>| p11: Initializing module: p11-kit-trust
- |<2>| p11: Initializing module: gnome-keyring
- |<3>| ASSERT: pkcs11.c[compat_load]:685
- |<3>| p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE
- |<3>| p11 attrs: CKA_TRUSTED
- |<3>| p11 attrs: CKA_CERTIFICATE_CATEGORY=CA
- |<3>| p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE
- |<3>| p11 attrs: CKA_TRUSTED
- |<3>| p11 attrs: CKA_CERTIFICATE_CATEGORY=CA
- |<3>| ASSERT: pkcs11.c[find_objs_cb]:2763
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_obj_list_import_url3]:3084
- Processed 172 CA certificate(s).
- Resolving 'arteptweb-a.akamaihd.net:443'...
- Connecting to '104.83.4.131:443'...
- |<5>| REC[0x1392df8]: Allocating epoch #0
- |<3>| ASSERT: constate.c[_gnutls_epoch_get]:600
- |<5>| REC[0x1392df8]: Allocating epoch #1
- |<4>| HSK[0x1392df8]: Adv. version: 3.3
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384 (C0.87)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305 (CC.A9)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CCM (C0.AD)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384 (C0.73)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256 (C0.86)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CCM (C0.AC)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256 (C0.72)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CHACHA20_POLY1305 (CC.A8)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_256_GCM_SHA384 (00.9D)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CCM (C0.9D)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA256 (00.3D)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA256 (00.C0)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_128_GCM_SHA256 (00.9C)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CCM (C0.9C)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA256 (00.3C)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA256 (00.BA)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_GCM_SHA384 (00.9F)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.7D)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CHACHA20_POLY1305 (CC.AA)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CCM (C0.9F)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA256 (00.6B)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA256 (00.C4)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_GCM_SHA256 (00.9E)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.7C)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CCM (C0.9E)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA256 (00.67)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA256 (00.BE)
- |<4>| HSK[0x1392df8]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
- |<4>| EXT[0x1392df8]: Sending extension Extended Master Secret (0 bytes)
- |<4>| EXT[0x1392df8]: Sending extension Encrypt-then-MAC (0 bytes)
- |<4>| EXT[0x1392df8]: Sending extension OCSP Status Request (5 bytes)
- |<2>| HSK[0x1392df8]: sent server name: 'arteptweb-a.akamaihd.net'
- |<4>| EXT[0x1392df8]: Sending extension Server Name Indication (29 bytes)
- |<4>| EXT[0x1392df8]: Sending extension Safe Renegotiation (1 bytes)
- |<4>| EXT[0x1392df8]: Sending extension Session Ticket (0 bytes)
- |<4>| EXT[0x1392df8]: Sending extension Supported curves (12 bytes)
- |<4>| EXT[0x1392df8]: Sending extension Supported ECC Point Formats (2 bytes)
- |<4>| EXT[0x1392df8]: sent signature algo (4.1) RSA-SHA256
- |<4>| EXT[0x1392df8]: sent signature algo (4.3) ECDSA-SHA256
- |<4>| EXT[0x1392df8]: sent signature algo (5.1) RSA-SHA384
- |<4>| EXT[0x1392df8]: sent signature algo (5.3) ECDSA-SHA384
- |<4>| EXT[0x1392df8]: sent signature algo (6.1) RSA-SHA512
- |<4>| EXT[0x1392df8]: sent signature algo (6.3) ECDSA-SHA512
- |<4>| EXT[0x1392df8]: sent signature algo (3.1) RSA-SHA224
- |<4>| EXT[0x1392df8]: sent signature algo (3.3) ECDSA-SHA224
- |<4>| EXT[0x1392df8]: sent signature algo (2.1) RSA-SHA1
- |<4>| EXT[0x1392df8]: sent signature algo (2.3) ECDSA-SHA1
- |<4>| EXT[0x1392df8]: Sending extension Signature Algorithms (22 bytes)
- |<4>| HSK[0x1392df8]: CLIENT HELLO was queued [266 bytes]
- |<5>| REC[0x1392df8]: Preparing Packet Handshake(22) with length: 266 and min pad: 0
- |<5>| REC[0x1392df8]: Sent Packet[1] Handshake(22) in epoch 0 and length: 271
- |<3>| ASSERT: buffers.c[get_last_packet]:1159
- |<5>| REC[0x1392df8]: SSL 3.3 Handshake packet received. Epoch 0, length: 60
- |<5>| REC[0x1392df8]: Expected Packet Handshake(22)
- |<5>| REC[0x1392df8]: Received Packet Handshake(22) with length: 60
- |<5>| REC[0x1392df8]: Decrypted Packet[0] Handshake(22) with length: 60
- |<4>| HSK[0x1392df8]: SERVER HELLO (2) was received. Length 56[56], frag offset 0, frag length: 56, sequence: 0
- |<4>| HSK[0x1392df8]: Server's version: 3.3
- |<4>| HSK[0x1392df8]: SessionID length: 0
- |<4>| HSK[0x1392df8]: SessionID: c0
- |<4>| HSK[0x1392df8]: Selected cipher suite: ECDHE_ECDSA_AES_256_GCM_SHA384
- |<4>| HSK[0x1392df8]: Selected compression method: NULL (0)
- |<4>| EXT[0x1392df8]: Parsing extension 'Supported ECC Point Formats/11' (4 bytes)
- |<4>| EXT[0x1392df8]: Parsing extension 'Session Ticket/35' (0 bytes)
- |<4>| EXT[0x1392df8]: Parsing extension 'OCSP Status Request/5' (0 bytes)
- |<4>| HSK[0x1392df8]: Allowing unsafe initial negotiation
- |<3>| ASSERT: buffers.c[get_last_packet]:1159
- |<5>| REC[0x1392df8]: SSL 3.3 Handshake packet received. Epoch 0, length: 2361
- |<5>| REC[0x1392df8]: Expected Packet Handshake(22)
- |<5>| REC[0x1392df8]: Received Packet Handshake(22) with length: 2361
- |<5>| REC[0x1392df8]: Decrypted Packet[1] Handshake(22) with length: 2361
- |<4>| HSK[0x1392df8]: CERTIFICATE (11) was received. Length 2357[2357], frag offset 0, frag length: 2357, sequence: 0
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: buffers.c[get_last_packet]:1159
- |<5>| REC[0x1392df8]: SSL 3.3 Handshake packet received. Epoch 0, length: 1043
- |<5>| REC[0x1392df8]: Expected Packet Handshake(22)
- |<5>| REC[0x1392df8]: Received Packet Handshake(22) with length: 1043
- |<5>| REC[0x1392df8]: Decrypted Packet[2] Handshake(22) with length: 1043
- |<4>| HSK[0x1392df8]: CERTIFICATE STATUS (22) was received. Length 1039[1039], frag offset 0, frag length: 1039, sequence: 0
- - Certificate type: X.509
- - Got a certificate list of 2 certificates.
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- - Certificate[0] info:
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- - subject `CN=a248.e.akamai.net,O=Akamai Technologies\, Inc.,L=Cambridge,ST=Massachusetts,C=US', issuer `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', serial 0x63b9ec7eff988335f113d67d2f864d35, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2016-07-28 00:00:00 UTC', expires `2017-07-28 23:59:59 UTC', pin-sha256="zuIdY8msZFsfzYCPVJRwXrljgnZRonhO4XXMzgE5WSs="
- Public Key ID:
- sha1:d8bfb32db690aa2829b3b2e760b4d4dcf4970978
- sha256:cee21d63c9ac645b1fcd808f5494705eb963827651a2784ee175ccce0139592b
- Public Key PIN:
- pin-sha256:zuIdY8msZFsfzYCPVJRwXrljgnZRonhO4XXMzgE5WSs=
- Public key's random art:
- +--[SECP256R1]----+
- | |
- | . |
- | o E |
- | o o oo. o |
- | o o ...S+ |
- |o . .o |
- |.+ o . |
- |B... . .+o |
- |=Bo ... .+=. |
- +-----------------+
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- - Certificate[1] info:
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- - subject `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', issuer `CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US', serial 0x3f9287be9d1da4a37a9df6282e775ac4, EC/ECDSA key 256 bits, signed using RSA-SHA256, activated `2015-05-12 00:00:00 UTC', expires `2025-05-11 23:59:59 UTC', pin-sha256="pvsOo/07kXBfe36yjJgm6H46EJRe7gurjSAeunJgFyg="
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
- |<3>| ASSERT: ocsp.c[find_signercert]:1906
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[_gnutls_x509_der_encode]:865
- |<3>| ASSERT: ocsp.c[find_signercert]:1960
- |<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
- |<3>| ASSERT: ocsp.c[gnutls_ocsp_resp_verify]:2218
- |<3>| ASSERT: common.c[_gnutls_x509_get_raw_field2]:1522
- |<3>| ASSERT: ocsp.c[find_signercert]:1906
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[_gnutls_x509_der_encode]:865
- |<3>| ASSERT: ocsp.c[find_signercert]:1960
- |<3>| ASSERT: pk.c[_wrap_nettle_pk_verify]:679
- |<3>| ASSERT: pubkey.c[pubkey_verify_data]:1962
- |<3>| ASSERT: pubkey.c[gnutls_pubkey_verify_data2]:1630
- |<3>| ASSERT: ocsp.c[_ocsp_resp_verify_direct]:2022
- |<3>| ASSERT: x509.c[check_ocsp_response]:147
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: verify.c[verify_crt]:604
- |<2>| GNUTLS_SEC_PARAM_LOW: certificate's issuer security level is unacceptable
- |<3>| ASSERT: verify.c[is_level_acceptable]:429
- |<3>| ASSERT: verify.c[verify_crt]:714
- |<3>| ASSERT: verify.c[verify_crt]:743
- |<3>| ASSERT: verify.c[_gnutls_verify_crt_status]:913
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: verify.c[verify_crt]:604
- |<2>| GNUTLS_SEC_PARAM_LOW: certificate's issuer security level is unacceptable
- |<3>| ASSERT: verify.c[is_level_acceptable]:429
- |<3>| ASSERT: verify.c[verify_crt]:714
- |<3>| ASSERT: verify.c[verify_crt]:743
- |<3>| ASSERT: verify.c[_gnutls_verify_crt_status]:913
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4092
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4105
- |<2>| crt_is_known: did not find any cert
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4092
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4105
- |<2>| crt_is_known: did not find any cert
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4092
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4105
- |<2>| crt_is_known: did not find any cert
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4092
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3552
- |<3>| ASSERT: pkcs11.c[gnutls_pkcs11_crt_is_known]:4105
- |<2>| crt_is_known: did not find any cert
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: pkcs11.c[find_cert_cb]:3727
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<2>| looking for key purpose '1.3.6.1.5.5.7.3.1', but have '1.3.6.1.5.5.7.3.4'
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: dn.c[_gnutls_x509_compare_raw_dn]:1003
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: mpi.c[_gnutls_x509_read_uint]:246
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[x509_read_value]:698
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
- |<3>| ASSERT: extensions.c[_gnutls_get_extension]:65
- |<3>| ASSERT: common.c[x509_read_value]:698
- - Status: The certificate is NOT trusted. The received OCSP status response is invalid.
- *** PKI verification of server certificate failed...
- |<3>| ASSERT: handshake.c[run_verify_callback]:2751
- |<3>| ASSERT: handshake.c[handshake_client]:2862
- *** Fatal error: Error in the certificate.
- |<5>| REC: Sending Alert[2|42] - Certificate is bad
- |<5>| REC[0x1392df8]: Preparing Packet Alert(21) with length: 2 and min pad: 0
- |<5>| REC[0x1392df8]: Sent Packet[2] Alert(21) in epoch 0 and length: 7
- *** handshake has failed: Error in the certificate.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement