Hello,

I've been trying to get SSL client auth to work using a simple URL 
client.  The command line looks like the following:

java -Djava.protocol.handler.pkgs=com.sun.net.ssl.internal.www.protocol 
-Djavax.net.ssl.trustStore=matt.jks -Djavax.net.debug=all URLClient 
https://akula.geek.ca/ >out 2>&1

The output can be seen at the bottom of this message.  I've searched 
around quite a lot for answers but I couldn't find any.

I have two keystores, one with the certificate being used by Tomcat as 
per the SSL-Howto + a trusted cert entry from the client which is in the 
keystore matt,jks, which has tomcat's certificate imported as a trusted 
cert.

Just as a test, I removed the -Dcom.sun.net.ssl.trustStore variable, and 
predictably, the failure was related to not trusting the server cert, 
which leads me to believe my setup is reasonable.

Tomcat client auth does work when I use Mozilla and a Thawte freemail 
certificate.

Can anyone help?  It sure would be appreciated.

--Matt

-- ssl debug --

keyStore is :
keyStore type is : jks
init keystore
init keymanager of type SunX509
trustStore is: matt.jks
trustStore type is : jks
init truststore
adding as trusted cert: [
[
   Version: V1
   Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

   Key:  com.sun.rsajca.JSA_RSAPublicKey@20aea8
   Validity: [From: Wed Jul 17 19:54:05 PDT 2002,
                To: Thu Jul 17 19:54:05 PDT 2003]
   Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   SerialNumber: [    3d362dcd ]

]
   Algorithm: [MD5withRSA]
   Signature:
0000: 6A 86 D4 89 04 9B 4C CF   BC 15 82 86 F0 63 21 BC  j.....L......c!.
0010: 09 B3 6A 69 84 0B 6C 69   E7 DC F1 EC BE 4A E9 BB  ..ji..li.....J..
0020: E3 94 BD FF 10 B5 87 45   9C 12 34 8F 61 E5 4E E1  .......E..4.a.N.
0030: 6F E8 44 AD B7 81 60 C7   7E 99 88 54 0E 97 C2 51  o.D...`....T...Q
0040: 37 70 83 0C 2D 20 98 41   1B 98 E3 9D 22 82 FF C8  7p..- .A...."...
0050: 26 01 73 46 75 5D 3F 8F   60 00 21 41 2E 64 02 97  &.sFu]?.`.!A.d..
0060: 5F D1 44 CF 47 7D 22 AA   99 91 FA BA 02 D2 AD 95  _.D.G.".........
0070: BF 80 A4 A9 06 DB B3 7A   CA 0F C0 7D 32 50 54 D0  .......z....2PT.

]
adding private entry as trusted cert: [
[
   Version: V1
   Subject: CN=Matt, OU=MattCo, O=MattCo Intl, L=Vancouber, ST=BC, C=CA
   Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

   Key:  Sun DSA Public Key
     Parameters:DSA
        p:     fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 
c31e3f80 b6512669
     455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f 
f26660b7
     6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 
150f04fb
     83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d 
d14801c7
        q:     9760508f 15230bcc b292b982 a2eb840b f0581cf5
        g:     f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 
f9574c0b 3d078267
     5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 
8cc8a6e1
     3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 
7a01243b
     cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b 
fecf492a

   y:
     8f48952d e95738ee 0a2f626f d4afb579 b5d49f19 c2f7015d 8a8d591b 
cc526cda
     54420f18 95fc8024 ab665942 939f2001 0506f209 46c2e3f3 a59c35fa 
d6ee2610
     ef3f2def edc80a69 89d407fd c8c7e1a1 89644276 12ea915d 57182ce5 
5f7e08b0
     90eb4f3d 22f57351 f1b9ae88 7ce43014 9109b378 71058eac 0107f75d 
b56798f3

   Validity: [From: Wed Jul 17 20:30:01 PDT 2002,
                To: Tue Oct 15 20:30:01 PDT 2002]
   Issuer: CN=Matt, OU=MattCo, O=MattCo Intl, L=Vancouber, ST=BC, C=CA
   SerialNumber: [    3d363639 ]

]
   Algorithm: [SHA1withDSA]
   Signature:
0000: 30 2C 02 14 53 FA 7A 1F   37 D8 F8 04 CB 0A 44 18  0,..S.z.7.....D.
0010: 3F 1E C8 44 C2 9A 41 53   02 14 41 A9 A7 43 EB 02  ?..D..AS..A..C..
0020: 6A CA EF CB 43 73 63 FA   14 94 12 E5 37 56        j...Csc.....7V

]
init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, v3.1
RandomCookie:  GMT: 1026965420 bytes = { 108, 14, 130, 201, 213, 23, 
156, 175, 170, 32, 66, 108, 200, 212, 161, 31, 154, 113, 99, 220, 220, 
105, 95, 183, 130, 93, 79, 102 }
Session ID:  {}
Cipher Suites:  { 0, 5, 0, 4, 0, 9, 0, 10, 0, 18, 0, 19, 0, 3, 0, 17 }
Compression Methods:  { 0 }
***
[write] MD5 and SHA1 hashes:  len = 59
0000: 01 00 00 37 03 01 3D 36   40 AC 6C 0E 82 C9 D5 17  ...7..=6@.l.....
0010: 9C AF AA 20 42 6C C8 D4   A1 1F 9A 71 63 DC DC 69  ... Bl.....qc..i
0020: 5F B7 82 5D 4F 66 00 00   10 00 05 00 04 00 09 00  _..]Of..........
0030: 0A 00 12 00 13 00 03 00   11 01 00                 ...........
main, WRITE:  SSL v3.1 Handshake, length = 59
[write] MD5 and SHA1 hashes:  len = 77
0000: 01 03 01 00 24 00 00 00   20 00 00 05 00 00 04 01  ....$... .......
0010: 00 80 00 00 09 06 00 40   00 00 0A 07 00 C0 00 00  .......@........
0020: 12 00 00 13 00 00 03 02   00 80 00 00 11 3D 36 40  .............=6@
0030: AC 6C 0E 82 C9 D5 17 9C   AF AA 20 42 6C C8 D4 A1  .l........ Bl...
0040: 1F 9A 71 63 DC DC 69 5F   B7 82 5D 4F 66           ..qc..i_..]Of
main, WRITE:  SSL v2, contentType = 22, translated length = 16310
main, READ:  SSL v3.1 Handshake, length = 1001
*** ServerHello, v3.1
RandomCookie:  GMT: 1026965420 bytes = { 242, 192, 192, 194, 10, 102, 
94, 61, 176, 11, 218, 205, 193, 249, 93, 36, 69, 180, 165, 80, 74, 47, 
0, 47, 109, 204, 155, 222 }
Session ID:  {61, 54, 64, 172, 12, 17, 155, 249, 210, 243, 237, 198, 99, 
113, 86, 232, 70, 32, 159, 252, 83, 83, 72, 196, 158, 12, 73, 145, 61, 
170, 203, 51}
Cipher Suite:  { 0, 5 }
Compression Method: 0
***
%% Created:  [Session-1, SSL_RSA_WITH_RC4_128_SHA]
** SSL_RSA_WITH_RC4_128_SHA
[read] MD5 and SHA1 hashes:  len = 74
0000: 02 00 00 46 03 01 3D 36   40 AC F2 C0 C0 C2 0A 66  ...F..=6@......f
0010: 5E 3D B0 0B DA CD C1 F9   5D 24 45 B4 A5 50 4A 2F  ^=......]$E..PJ/
0020: 00 2F 6D CC 9B DE 20 3D   36 40 AC 0C 11 9B F9 D2  ./m... =6@......
0030: F3 ED C6 63 71 56 E8 46   20 9F FC 53 53 48 C4 9E  ...cqV.F ..SSH..
0040: 0C 49 91 3D AA CB 33 00   05 00                    .I.=..3...
*** Certificate chain
chain [0] = [
[
   Version: V1
   Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

   Key:  com.sun.rsajca.JSA_RSAPublicKey@435cac
   Validity: [From: Wed Jul 17 19:54:05 PDT 2002,
                To: Thu Jul 17 19:54:05 PDT 2003]
   Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   SerialNumber: [    3d362dcd ]

]
   Algorithm: [MD5withRSA]
   Signature:
0000: 6A 86 D4 89 04 9B 4C CF   BC 15 82 86 F0 63 21 BC  j.....L......c!.
0010: 09 B3 6A 69 84 0B 6C 69   E7 DC F1 EC BE 4A E9 BB  ..ji..li.....J..
0020: E3 94 BD FF 10 B5 87 45   9C 12 34 8F 61 E5 4E E1  .......E..4.a.N.
0030: 6F E8 44 AD B7 81 60 C7   7E 99 88 54 0E 97 C2 51  o.D...`....T...Q
0040: 37 70 83 0C 2D 20 98 41   1B 98 E3 9D 22 82 FF C8  7p..- .A...."...
0050: 26 01 73 46 75 5D 3F 8F   60 00 21 41 2E 64 02 97  &.sFu]?.`.!A.d..
0060: 5F D1 44 CF 47 7D 22 AA   99 91 FA BA 02 D2 AD 95  _.D.G.".........
0070: BF 80 A4 A9 06 DB B3 7A   CA 0F C0 7D 32 50 54 D0  .......z....2PT.

]
***
stop on trusted cert: [
[
   Version: V1
   Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

   Key:  com.sun.rsajca.JSA_RSAPublicKey@435cac
   Validity: [From: Wed Jul 17 19:54:05 PDT 2002,
                To: Thu Jul 17 19:54:05 PDT 2003]
   Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA
   SerialNumber: [    3d362dcd ]

]
   Algorithm: [MD5withRSA]
   Signature:
0000: 6A 86 D4 89 04 9B 4C CF   BC 15 82 86 F0 63 21 BC  j.....L......c!.
0010: 09 B3 6A 69 84 0B 6C 69   E7 DC F1 EC BE 4A E9 BB  ..ji..li.....J..
0020: E3 94 BD FF 10 B5 87 45   9C 12 34 8F 61 E5 4E E1  .......E..4.a.N.
0030: 6F E8 44 AD B7 81 60 C7   7E 99 88 54 0E 97 C2 51  o.D...`....T...Q
0040: 37 70 83 0C 2D 20 98 41   1B 98 E3 9D 22 82 FF C8  7p..- .A...."...
0050: 26 01 73 46 75 5D 3F 8F   60 00 21 41 2E 64 02 97  &.sFu]?.`.!A.d..
0060: 5F D1 44 CF 47 7D 22 AA   99 91 FA BA 02 D2 AD 95  _.D.G.".........
0070: BF 80 A4 A9 06 DB B3 7A   CA 0F C0 7D 32 50 54 D0  .......z....2PT.

]
[read] MD5 and SHA1 hashes:  len = 642
0000: 0B 00 02 7E 00 02 7B 00   02 78 30 82 02 74 30 82  .........x0..t0.
0010: 01 DD 02 04 3D 36 2D CD   30 0D 06 09 2A 86 48 86  ....=6-.0...*.H.
0020: F7 0D 01 01 04 05 00 30   81 80 31 0B 30 09 06 03  .......0..1.0...
0030: 55 04 06 13 02 43 41 31   19 30 17 06 03 55 04 08  U....CA1.0...U..
0040: 13 10 42 72 69 74 69 73   68 20 43 6F 6C 75 6D 62  ..British Columb
0050: 69 61 31 12 30 10 06 03   55 04 07 13 09 56 61 6E  ia1.0...U....Van
0060: 63 6F 75 76 65 72 31 18   30 16 06 03 55 04 0A 13  couver1.0...U...
0070: 0F 54 68 65 20 47 65 65   6B 20 43 61 72 74 65 6C  .The Geek Cartel
0080: 31 10 30 0E 06 03 55 04   0B 13 07 57 65 62 20 4F  1.0...U....Web O
0090: 70 73 31 16 30 14 06 03   55 04 03 13 0D 61 6B 75  ps1.0...U....aku
00A0: 6C 61 2E 67 65 65 6B 2E   63 61 30 1E 17 0D 30 32  la.geek.ca0...02
00B0: 30 37 31 38 30 32 35 34   30 35 5A 17 0D 30 33 30  0718025405Z..030
00C0: 37 31 38 30 32 35 34 30   35 5A 30 81 80 31 0B 30  718025405Z0..1.0
00D0: 09 06 03 55 04 06 13 02   43 41 31 19 30 17 06 03  ...U....CA1.0...
00E0: 55 04 08 13 10 42 72 69   74 69 73 68 20 43 6F 6C  U....British Col
00F0: 75 6D 62 69 61 31 12 30   10 06 03 55 04 07 13 09  umbia1.0...U....
0100: 56 61 6E 63 6F 75 76 65   72 31 18 30 16 06 03 55  Vancouver1.0...U
0110: 04 0A 13 0F 54 68 65 20   47 65 65 6B 20 43 61 72  ....The Geek Car
0120: 74 65 6C 31 10 30 0E 06   03 55 04 0B 13 07 57 65  tel1.0...U....We
0130: 62 20 4F 70 73 31 16 30   14 06 03 55 04 03 13 0D  b Ops1.0...U....
0140: 61 6B 75 6C 61 2E 67 65   65 6B 2E 63 61 30 81 9F  akula.geek.ca0..
0150: 30 0D 06 09 2A 86 48 86   F7 0D 01 01 01 05 00 03  0...*.H.........
0160: 81 8D 00 30 81 89 02 81   81 00 E1 F1 D8 E3 F6 1A  ...0............
0170: 2E ED BF 45 D0 CD 7F B8   25 46 49 E5 4A D8 AE 80  ...E....%FI.J...
0180: 7A 7A 7C F2 23 6B 7B C5   7F 3E 16 2D 39 D9 A0 A0  zz..#k...>.-9...
0190: 5C F2 77 EC 2A DE 56 18   AE 7E C8 0D A9 9F 4F FC  \.w.*.V.......O.
01A0: 5D 78 85 5E 2D D3 AF 63   D3 FA 86 76 82 E7 42 60  ]x.^-..c...v..B`
01B0: 42 A1 08 7C B7 50 A8 D5   1A B0 9B 27 7A 57 8A D4  B....P.....'zW..
01C0: 07 2E C7 8A 06 D7 53 44   2E 6B A8 02 33 39 9F 98  ......SD.k..39..
01D0: 0B C3 9D E8 30 E9 CE 10   EF BF 6C D9 9B F5 03 90  ....0.....l.....
01E0: A6 32 50 E7 A0 30 AD 53   4F B7 02 03 01 00 01 30  .2P..0.SO......0
01F0: 0D 06 09 2A 86 48 86 F7   0D 01 01 04 05 00 03 81  ...*.H..........
0200: 81 00 6A 86 D4 89 04 9B   4C CF BC 15 82 86 F0 63  ..j.....L......c
0210: 21 BC 09 B3 6A 69 84 0B   6C 69 E7 DC F1 EC BE 4A  !...ji..li.....J
0220: E9 BB E3 94 BD FF 10 B5   87 45 9C 12 34 8F 61 E5  .........E..4.a.
0230: 4E E1 6F E8 44 AD B7 81   60 C7 7E 99 88 54 0E 97  N.o.D...`....T..
0240: C2 51 37 70 83 0C 2D 20   98 41 1B 98 E3 9D 22 82  .Q7p..- .A....".
0250: FF C8 26 01 73 46 75 5D   3F 8F 60 00 21 41 2E 64  ..&.sFu]?.`.!A.d
0260: 02 97 5F D1 44 CF 47 7D   22 AA 99 91 FA BA 02 D2  .._.D.G.".......
0270: AD 95 BF 80 A4 A9 06 DB   B3 7A CA 0F C0 7D 32 50  .........z....2P
0280: 54 D0                                              T.
*** CertificateRequest
Cert Types: DSS, RSA,
Cert Authorities:
<CN=Matthew MacKenzie, OU=Executive, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA>
<CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, 
ST=British Columbia, C=CA>
[read] MD5 and SHA1 hashes:  len = 281
0000: 0D 00 01 15 02 02 01 01   10 00 89 30 81 86 31 0B  ...........0..1.
0010: 30 09 06 03 55 04 06 13   02 43 41 31 19 30 17 06  0...U....CA1.0..
0020: 03 55 04 08 13 10 42 72   69 74 69 73 68 20 43 6F  .U....British Co
0030: 6C 75 6D 62 69 61 31 12   30 10 06 03 55 04 07 13  lumbia1.0...U...
0040: 09 56 61 6E 63 6F 75 76   65 72 31 18 30 16 06 03  .Vancouver1.0...
0050: 55 04 0A 13 0F 54 68 65   20 47 65 65 6B 20 43 61  U....The Geek Ca
0060: 72 74 65 6C 31 12 30 10   06 03 55 04 0B 13 09 45  rtel1.0...U....E
0070: 78 65 63 75 74 69 76 65   31 1A 30 18 06 03 55 04  xecutive1.0...U.
0080: 03 13 11 4D 61 74 74 68   65 77 20 4D 61 63 4B 65  ...Matthew MacKe
0090: 6E 7A 69 65 00 83 30 81   80 31 0B 30 09 06 03 55  nzie..0..1.0...U
00A0: 04 06 13 02 43 41 31 19   30 17 06 03 55 04 08 13  ....CA1.0...U...
00B0: 10 42 72 69 74 69 73 68   20 43 6F 6C 75 6D 62 69  .British Columbi
00C0: 61 31 12 30 10 06 03 55   04 07 13 09 56 61 6E 63  a1.0...U....Vanc
00D0: 6F 75 76 65 72 31 18 30   16 06 03 55 04 0A 13 0F  ouver1.0...U....
00E0: 54 68 65 20 47 65 65 6B   20 43 61 72 74 65 6C 31  The Geek Cartel1
00F0: 10 30 0E 06 03 55 04 0B   13 07 57 65 62 20 4F 70  .0...U....Web Op
0100: 73 31 16 30 14 06 03 55   04 03 13 0D 61 6B 75 6C  s1.0...U....akul
0110: 61 2E 67 65 65 6B 2E 63   61                       a.geek.ca
*** ServerHelloDone
[read] MD5 and SHA1 hashes:  len = 4
0000: 0E 00 00 00                                        ....
*** Certificate chain
***
*** ClientKeyExchange, RSA PreMasterSecret, v3.1
Random Secret:  { 3, 1, 65, 225, 212, 193, 122, 21, 42, 96, 2, 111, 229, 
20, 6, 106, 75, 154, 178, 219, 142, 217, 175, 222, 202, 228, 182, 153, 
220, 5, 42, 172, 47, 199, 61, 50, 209, 102, 233, 71, 133, 49, 55, 182, 
167, 75, 141, 135 }
[write] MD5 and SHA1 hashes:  len = 141
0000: 0B 00 00 03 00 00 00 10   00 00 82 00 80 87 7D B3  ................
0010: 94 EA 16 B8 03 23 62 10   A4 BA F3 8E 61 39 EF E3  .....#b.....a9..
0020: B7 9D 40 D7 52 73 83 85   C9 70 0A E5 B7 5B 09 7F  ..@.Rs...p...[..
0030: 97 80 94 D9 76 FB 53 88   88 96 6E C5 81 77 A2 B2  ....v.S...n..w..
0040: 29 2B 85 E9 75 E5 3D 1C   27 4D EC F6 8B AB D4 24  )+..u.=.'M.....$
0050: AE CC 16 59 F9 66 C5 94   F6 65 BF 71 20 0F A5 D3  ...Y.f...e.q ...
0060: 06 75 DC 00 8B C9 F0 EE   82 96 95 9D 05 99 EC 28  .u.............(
0070: 8F C7 C4 8A 96 66 54 4F   E4 AD B7 81 65 FF CF 56  .....fTO....e..V
0080: F3 D8 B2 1C A3 E7 8D E8   83 87 00 97 7D           .............
main, WRITE:  SSL v3.1 Handshake, length = 141
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 41 E1 D4 C1 7A 15   2A 60 02 6F E5 14 06 6A  ..A...z.*`.o...j
0010: 4B 9A B2 DB 8E D9 AF DE   CA E4 B6 99 DC 05 2A AC  K.............*.
0020: 2F C7 3D 32 D1 66 E9 47   85 31 37 B6 A7 4B 8D 87  /.=2.f.G.17..K..
CONNECTION KEYGEN:
Client Nonce:
0000: 3D 36 40 AC 6C 0E 82 C9   D5 17 9C AF AA 20 42 6C  =6@.l........ Bl
0010: C8 D4 A1 1F 9A 71 63 DC   DC 69 5F B7 82 5D 4F 66  .....qc..i_..]Of
Server Nonce:
0000: 3D 36 40 AC F2 C0 C0 C2   0A 66 5E 3D B0 0B DA CD  =6@......f^=....
0010: C1 F9 5D 24 45 B4 A5 50   4A 2F 00 2F 6D CC 9B DE  ..]$E..PJ/./m...
Master Secret:
0000: 3D FF D2 D5 D2 77 63 BD   54 D3 68 89 CF 25 E9 4A  =....wc.T.h..%.J
0010: CE 1A 3C B5 EC BB 4A 3F   5F 26 52 C5 87 A2 DB B4  ..<...J?_&R.....
0020: E3 C4 8C D4 41 00 2F 56   D2 C9 ED 4B 34 38 69 A3  ....A./V...K48i.
Client MAC write Secret:
0000: D4 4B 6E 7D DB 32 4F CE   9F BE F7 EF E0 75 7C 67  .Kn..2O......u.g
0010: 7A A0 D0 E7                                        z...
Server MAC write Secret:
0000: 94 ED AD D6 92 3F 1B 41   A2 5D 84 F3 9E 9D 58 3A  .....?.A.]....X:
0010: 38 CF 7D 2B                                        8..+
Client write key:
0000: E9 21 63 B8 E4 12 9E 54   17 74 70 C4 30 D7 F0 DA  .!c....T.tp.0...
Server write key:
0000: D2 B9 10 3B 0C 65 8C 7D   5B 12 A0 36 1C 16 44 5E  ...;.e..[..6..D^
... no IV for cipher
main, WRITE:  SSL v3.1 Change Cipher Spec, length = 1
*** Finished, v3.1
verify_data:  { 238, 126, 118, 23, 50, 54, 247, 243, 33, 60, 47, 109 }
***
[write] MD5 and SHA1 hashes:  len = 16
0000: 14 00 00 0C EE 7E 76 17   32 36 F7 F3 21 3C 2F 6D  ......v.26..!</m
Plaintext before ENCRYPTION:  len = 36
0000: 14 00 00 0C EE 7E 76 17   32 36 F7 F3 21 3C 2F 6D  ......v.26..!</m
0010: 31 86 9B 10 07 BD C6 C7   D3 0C 08 3A CA B2 E6 9F  1..........:....
0020: B2 A1 DD 26                                        ...&
main, WRITE:  SSL v3.1 Handshake, length = 36
Exception in thread "main" java.io.IOException: Broken pipe
        at java.net.SocketOutputStream.socketWrite(Native Method)
        at java.net.SocketOutputStream.write(SocketOutputStream.java:83)
        at com.sun.net.ssl.internal.ssl.OutputRecord.a([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.ssl.Handshaker.sendChangeCipherSpec
([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.ClientHandshaker.e([DashoPro-
V1.2-120198])
        at com.sun.net.ssl.internal.ssl.ClientHandshaker.a([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage
([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.Handshaker.process_record([DashoPro-
V1.2-120198])
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198])
        at com.sun.net.ssl.internal.ssl.AppOutputStream.write([DashoPro-
V1.2-120198])
        at java.io.OutputStream.write(OutputStream.java:61)
        at 
com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsClient.doConnect
([DashoPro-V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.NetworkClient.openServer
([DashoPro-V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpClient.l([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpClient.<init>
([DashoPro-V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsClient.<init>
([DashoPro-V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsClient.a([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsClient.a([DashoPro-
V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsURLConnection.connect
([DashoPro-V1.2-120198])
        at 
com.sun.net.ssl.internal.www.protocol.https.HttpsURLConnection.getInputStream(
[DashoPro-V1.2-120198])
        at URLClient.main(URLClient.java:11)



--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to