Created
September 12, 2017 07:20
-
-
Save Kindrat/6af59c6dc3f9ee6bae43a79bc1865e44 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
D:\SDKs\jdk8u144\bin\java -ea -Djavax.net.debug=ssl -Didea.test.cyclic.buffer.size=1048576 "-javaagent:C:\Program Files (x86)\JetBrains\IntelliJ IDEA 2017.1\lib\idea_rt.jar=6100:C:\Program Files (x86)\JetBrains\IntelliJ IDEA 2017.1\bin" -Dfile.encoding=UTF-8 -classpath "C:\Program Files (x86)\JetBrains\IntelliJ IDEA 2017.1\lib\idea_rt.jar;C:\Program Files (x86)\JetBrains\IntelliJ IDEA 2017.1\plugins\junit\lib\junit-rt.jar;C:\Program Files (x86)\JetBrains\IntelliJ IDEA 2017.1\plugins\junit\lib\junit5-rt.jar;D:\SDKs\jdk8u144\jre\lib\charsets.jar;D:\SDKs\jdk8u144\jre\lib\deploy.jar;D:\SDKs\jdk8u144\jre\lib\ext\access-bridge-64.jar;D:\SDKs\jdk8u144\jre\lib\ext\cldrdata.jar;D:\SDKs\jdk8u144\jre\lib\ext\dnsns.jar;D:\SDKs\jdk8u144\jre\lib\ext\jaccess.jar;D:\SDKs\jdk8u144\jre\lib\ext\jfxrt.jar;D:\SDKs\jdk8u144\jre\lib\ext\localedata.jar;D:\SDKs\jdk8u144\jre\lib\ext\nashorn.jar;D:\SDKs\jdk8u144\jre\lib\ext\sunec.jar;D:\SDKs\jdk8u144\jre\lib\ext\sunjce_provider.jar;D:\SDKs\jdk8u144\jre\lib\ext\sunmscapi.jar;D:\SDKs\jdk8u144\jre\lib\ext\sunpkcs11.jar;D:\SDKs\jdk8u144\jre\lib\ext\zipfs.jar;D:\SDKs\jdk8u144\jre\lib\javaws.jar;D:\SDKs\jdk8u144\jre\lib\jce.jar;D:\SDKs\jdk8u144\jre\lib\jfr.jar;D:\SDKs\jdk8u144\jre\lib\jfxswt.jar;D:\SDKs\jdk8u144\jre\lib\jsse.jar;D:\SDKs\jdk8u144\jre\lib\management-agent.jar;D:\SDKs\jdk8u144\jre\lib\plugin.jar;D:\SDKs\jdk8u144\jre\lib\resources.jar;D:\SDKs\jdk8u144\jre\lib\rt.jar;D:\Git\wolframalpha-client\out\test\classes;D:\Git\wolframalpha-client\out\test\resources;D:\Git\wolframalpha-client\out\production\classes;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.openfeign\feign-jackson\9.5.1\b208f26503f4f161b3315ccf93bdefae4b3cb3e1\feign-jackson-9.5.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.openfeign\feign-jaxb\9.5.1\13fff58ad967e5d98d205b34660d6a4a4d32f70d\feign-jaxb-9.5.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.openfeign\feign-slf4j\9.5.1\4770c5f4ad5d9014c161a86ff67891f81af409f1\feign-slf4j-9.5.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.openfeign\feign-core\9.5.1\590613b1bd18ec0396391fb259e00b7d685ee3e6\feign-core-9.5.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\ch.qos.logback\logback-classic\1.2.3\7c4f3c474fb2c041d8028740440937705ebb473a\logback-classic-1.2.3.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.slf4j\slf4j-api\1.7.25\da76ca59f6a57ee3102f8f9bd9cee742973efa8a\slf4j-api-1.7.25.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\com.google.code.findbugs\jsr305\3.0.1\f7be08ec23c21485b9b5a1cf1654c2ec8c58168d\jsr305-3.0.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.projectlombok\lombok\1.16.12\64b2d2e8734b54ddba60a69df68a6dac627366c8\lombok-1.16.12.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\javax.validation\validation-api\1.1.0.Final\8613ae82954779d518631e05daa73a6a954817d5\validation-api-1.1.0.Final.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\junit\junit\4.12\2973d150c0dc1fefe998f834810d68f278ea58ec\junit-4.12.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.benas\random-beans\3.7.0\9bbdaddef7ada311d8f2a06a65c7b8771bdd0f61\random-beans-3.7.0.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.assertj\assertj-core\3.8.0\b209d90ff2e279bee3e02547ee7b11349c52d0e3\assertj-core-3.8.0.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\com.fasterxml.jackson.core\jackson-databind\2.8.8.1\fb1930cd0b1b36924717229f56ca80d785401ff8\jackson-databind-2.8.8.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.hamcrest\hamcrest-core\1.3\42a25dc3219429f0e5d060061f71acb49bf010a0\hamcrest-core-1.3.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\ch.qos.logback\logback-core\1.2.3\864344400c3d4d92dfeb0a305dc87d953677c03c\logback-core-1.2.3.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.codehaus.janino\janino\3.0.7\1942d938c8f005b563b82d2b282d37bb50ac2bb5\janino-3.0.7.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.objenesis\objenesis\2.5.1\272bab9a4e5994757044d1fc43ce480c8cb907a4\objenesis-2.5.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\io.github.lukehutch\fast-classpath-scanner\2.2.1\187cc1069012798a67e5555976c85a3ab4d55778\fast-classpath-scanner-2.2.1.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\com.fasterxml.jackson.core\jackson-annotations\2.8.0\45b426f7796b741035581a176744d91090e2e6fb\jackson-annotations-2.8.0.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\com.fasterxml.jackson.core\jackson-core\2.8.8\d478fb6de45a7c3d2cad07c8ad70c7f0a797a020\jackson-core-2.8.8.jar;D:\Program files\Defaults\gradle\caches\modules-2\files-2.1\org.codehaus.janino\commons-compiler\3.0.7\6a51f1dfd496a3be7eea1678e592a9d379352f80\commons-compiler-3.0.7.jar" com.intellij.rt.execution.junit.JUnitStarter -ideVersion5 -junit4 com.github.nginate.wolframalpha.FullResultsAsyncIT,retrieveAsyncPod | |
01:16:50,164 |-INFO in ch.qos.logback.classic.LoggerContext[default] - Could NOT find resource [logback-test.xml] | |
01:16:50,165 |-INFO in ch.qos.logback.classic.LoggerContext[default] - Could NOT find resource [logback.groovy] | |
01:16:50,165 |-INFO in ch.qos.logback.classic.LoggerContext[default] - Found resource [logback.xml] at [file:/D:/Git/wolframalpha-client/out/test/resources/logback.xml] | |
01:16:50,375 |-INFO in ch.qos.logback.core.joran.action.ConversionRuleAction - registering conversion word wex with class [org.springframework.boot.logging.logback.WhitespaceThrowableProxyConverter] | |
01:16:50,846 |-INFO in ch.qos.logback.core.joran.action.AppenderAction - About to instantiate appender of type [ch.qos.logback.core.ConsoleAppender] | |
01:16:50,851 |-INFO in ch.qos.logback.core.joran.action.AppenderAction - Naming appender as [STDOUT] | |
01:16:50,858 |-INFO in ch.qos.logback.core.joran.action.NestedComplexPropertyIA - Assuming default type [ch.qos.logback.classic.encoder.PatternLayoutEncoder] for [encoder] property | |
01:16:50,926 |-INFO in ch.qos.logback.core.joran.action.AppenderAction - About to instantiate appender of type [ch.qos.logback.classic.AsyncAppender] | |
01:16:50,929 |-INFO in ch.qos.logback.core.joran.action.AppenderAction - Naming appender as [STDOUT-ASYNC] | |
01:16:50,929 |-INFO in ch.qos.logback.core.joran.action.AppenderRefAction - Attaching appender named [STDOUT] to ch.qos.logback.classic.AsyncAppender[STDOUT-ASYNC] | |
01:16:50,929 |-INFO in ch.qos.logback.classic.AsyncAppender[STDOUT-ASYNC] - Attaching appender named [STDOUT] to AsyncAppender. | |
01:16:50,930 |-INFO in ch.qos.logback.classic.AsyncAppender[STDOUT-ASYNC] - Setting discardingThreshold to 51 | |
01:16:50,930 |-INFO in ch.qos.logback.classic.joran.action.RootLoggerAction - Setting level of ROOT logger to INFO | |
01:16:50,930 |-INFO in ch.qos.logback.core.joran.action.AppenderRefAction - Attaching appender named [STDOUT-ASYNC] to Logger[ROOT] | |
01:16:50,931 |-INFO in ch.qos.logback.classic.joran.action.LoggerAction - Setting level of logger [com.github.nginate] to DEBUG | |
01:16:50,931 |-INFO in ch.qos.logback.classic.joran.action.LoggerAction - Setting level of logger [feign.Logger] to TRACE | |
01:16:50,931 |-INFO in ch.qos.logback.classic.joran.action.ConfigurationAction - End of configuration. | |
01:16:50,932 |-INFO in ch.qos.logback.classic.joran.JoranConfigurator@b9afc07 - Registering current configuration as safe fallback point | |
2017-09-12 01:16:51.166 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] ---> GET https://api.wolframalpha.com/v2/query?input=ukraine&appid=APP_ID&async=0.1 HTTP/1.1 | |
2017-09-12 01:16:51.169 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] ---> END HTTP (0-byte body) | |
trustStore is: D:\SDKs\jdk8u144\jre\lib\security\cacerts | |
trustStore type is : jks | |
trustStore provider is : | |
init truststore | |
adding as trusted cert: | |
Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US | |
Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US | |
Algorithm: RSA; Serial number: 0xc3517 | |
Valid from Mon Jun 21 07:00:00 EEST 1999 until Mon Jun 22 07:00:00 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US | |
Issuer: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US | |
Algorithm: EC; Serial number: 0xa68b79290000000050d091f9 | |
Valid from Tue Dec 18 17:25:36 EET 2012 until Fri Dec 18 17:55:36 EET 2037 | |
adding as trusted cert: | |
Subject: CN=SecureTrust CA, O=SecureTrust Corporation, C=US | |
Issuer: CN=SecureTrust CA, O=SecureTrust Corporation, C=US | |
Algorithm: RSA; Serial number: 0xcf08e5c0816a5ad427ff0eb271859d0 | |
Valid from Tue Nov 07 21:31:18 EET 2006 until Mon Dec 31 21:40:55 EET 2029 | |
adding as trusted cert: | |
Subject: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP | |
Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Sep 30 07:20:49 EEST 2003 until Sat Sep 30 07:20:49 EEST 2023 | |
adding as trusted cert: | |
Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0x83be056904246b1a1756ac95991c74a | |
Valid from Fri Nov 10 02:00:00 EET 2006 until Mon Nov 10 02:00:00 EET 2031 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x445734245b81899b35f2ceb82b3b5ba726f07528 | |
Valid from Thu Jan 12 20:59:32 EET 2012 until Sun Jan 12 20:59:32 EET 2042 | |
adding as trusted cert: | |
Subject: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0x59b1b579e8e2132e23907bda777755c | |
Valid from Thu Aug 01 15:00:00 EEST 2013 until Fri Jan 15 14:00:00 EET 2038 | |
adding as trusted cert: | |
Subject: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US | |
Issuer: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US | |
Algorithm: RSA; Serial number: 0x18acb56afd69b6153a636cafdafac4a1 | |
Valid from Mon Nov 27 02:00:00 EET 2006 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP | |
Issuer: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Fri May 29 08:00:39 EEST 2009 until Tue May 29 08:00:39 EEST 2029 | |
adding as trusted cert: | |
Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6 | |
Valid from Mon May 18 03:00:00 EEST 1998 until Wed Aug 02 02:59:59 EEST 2028 | |
adding as trusted cert: | |
Subject: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW | |
Issuer: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW | |
Algorithm: RSA; Serial number: 0x15c8bd65475cafb897005ee406d2bc9d | |
Valid from Mon Dec 20 04:31:27 EET 2004 until Wed Dec 20 04:31:27 EET 2034 | |
adding as trusted cert: | |
Subject: CN=AffirmTrust Commercial, O=AffirmTrust, C=US | |
Issuer: CN=AffirmTrust Commercial, O=AffirmTrust, C=US | |
Algorithm: RSA; Serial number: 0x7777062726a9b17c | |
Valid from Fri Jan 29 16:06:06 EET 2010 until Tue Dec 31 16:06:06 EET 2030 | |
adding as trusted cert: | |
Subject: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL | |
Issuer: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL | |
Algorithm: RSA; Serial number: 0x444c0 | |
Valid from Wed Oct 22 15:07:37 EEST 2008 until Mon Dec 31 14:07:37 EET 2029 | |
adding as trusted cert: | |
Subject: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US | |
Issuer: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US | |
Algorithm: RSA; Serial number: 0x50946cec18ead59c4dd597ef758fa0ad | |
Valid from Mon Nov 01 19:14:04 EET 2004 until Mon Jan 01 07:37:19 EET 2035 | |
adding as trusted cert: | |
Subject: CN=Sonera Class2 CA, O=Sonera, C=FI | |
Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI | |
Algorithm: RSA; Serial number: 0x1d | |
Valid from Fri Apr 06 10:29:40 EEST 2001 until Tue Apr 06 10:29:40 EEST 2021 | |
adding as trusted cert: | |
Subject: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US | |
Issuer: CN=America Online Root Certification Authority 1, O=America Online Inc., C=US | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Tue May 28 09:00:00 EEST 2002 until Thu Nov 19 22:43:00 EET 2037 | |
adding as trusted cert: | |
Subject: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US | |
Issuer: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US | |
Algorithm: EC; Serial number: 0x3cb2f4480a00e2feeb243b5e603ec36b | |
Valid from Mon Nov 05 02:00:00 EET 2007 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US | |
Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US | |
Algorithm: RSA; Serial number: 0x35def4cf | |
Valid from Sat Aug 22 19:41:51 EEST 1998 until Wed Aug 22 19:41:51 EEST 2018 | |
adding as trusted cert: | |
Subject: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Issuer: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Algorithm: EC; Serial number: 0x1f47afaa62007050544c019e9b63992a | |
Valid from Thu Mar 06 02:00:00 EET 2008 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=ISRG Root X1, O=Internet Security Research Group, C=US | |
Issuer: CN=ISRG Root X1, O=Internet Security Research Group, C=US | |
Algorithm: RSA; Serial number: 0x8210cfb0d240e3594463e0bb63828b00 | |
Valid from Thu Jun 04 14:04:38 EEST 2015 until Mon Jun 04 14:04:38 EEST 2035 | |
adding as trusted cert: | |
Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0x2ac5c266a0b409b8f0b79f2ae462577 | |
Valid from Fri Nov 10 02:00:00 EET 2006 until Mon Nov 10 02:00:00 EET 2031 | |
adding as trusted cert: | |
Subject: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US | |
Issuer: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Thu Mar 04 07:00:00 EET 2004 until Sun Mar 04 07:00:00 EET 2029 | |
adding as trusted cert: | |
Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 | |
Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 | |
Algorithm: RSA; Serial number: 0x4000000000121585308a2 | |
Valid from Wed Mar 18 12:00:00 EET 2009 until Sun Mar 18 12:00:00 EET 2029 | |
adding as trusted cert: | |
Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | |
Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | |
Algorithm: RSA; Serial number: 0x20000b9 | |
Valid from Fri May 12 21:46:00 EEST 2000 until Tue May 13 02:59:00 EEST 2025 | |
adding as trusted cert: | |
Subject: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA | |
Issuer: CN=Thawte Timestamping CA, OU=Thawte Certification, O=Thawte, L=Durbanville, ST=Western Cape, C=ZA | |
Algorithm: RSA; Serial number: 0x67c8e1e8e3be1cbdfc913b8ea6238749 | |
Valid from Wed Jan 01 02:00:00 EET 1997 until Sat Jan 02 01:59:59 EET 2021 | |
adding as trusted cert: | |
Subject: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Thu Jan 01 02:00:00 EET 2004 until Mon Jan 01 01:59:59 EET 2029 | |
adding as trusted cert: | |
Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US | |
Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Jun 29 20:39:16 EEST 2004 until Thu Jun 29 20:39:16 EEST 2034 | |
adding as trusted cert: | |
Subject: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU | |
Issuer: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Sep 30 19:13:43 EEST 2003 until Wed Sep 30 19:13:44 EEST 2037 | |
adding as trusted cert: | |
Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362afe650afd | |
Valid from Fri Jul 09 21:10:42 EEST 1999 until Tue Jul 09 21:19:22 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57 | |
Valid from Fri Oct 01 03:00:00 EEST 1999 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE | |
Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE | |
Algorithm: RSA; Serial number: 0x40000000001154b5ac394 | |
Valid from Tue Sep 01 15:00:00 EEST 1998 until Fri Jan 28 14:00:00 EET 2028 | |
adding as trusted cert: | |
Subject: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Issuer: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362de0b35f1b | |
Valid from Fri Jul 09 21:31:20 EEST 1999 until Tue Jul 09 21:40:36 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=AffirmTrust Networking, O=AffirmTrust, C=US | |
Issuer: CN=AffirmTrust Networking, O=AffirmTrust, C=US | |
Algorithm: RSA; Serial number: 0x7c4f04391cd4992d | |
Valid from Fri Jan 29 16:08:24 EET 2010 until Tue Dec 31 16:08:24 EET 2030 | |
adding as trusted cert: | |
Subject: CN=AffirmTrust Premium, O=AffirmTrust, C=US | |
Issuer: CN=AffirmTrust Premium, O=AffirmTrust, C=US | |
Algorithm: RSA; Serial number: 0x6d8c1446b1a60aee | |
Valid from Fri Jan 29 16:10:36 EET 2010 until Mon Dec 31 16:10:36 EET 2040 | |
adding as trusted cert: | |
Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE | |
Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE | |
Algorithm: RSA; Serial number: 0x20000bf | |
Valid from Wed May 17 17:01:00 EEST 2000 until Sun May 18 02:59:00 EEST 2025 | |
adding as trusted cert: | |
Subject: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US | |
Issuer: CN=America Online Root Certification Authority 2, O=America Online Inc., C=US | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Tue May 28 09:00:00 EEST 2002 until Tue Sep 29 17:08:00 EEST 2037 | |
adding as trusted cert: | |
Subject: CN=LuxTrust Global Root, O=LuxTrust s.a., C=LU | |
Issuer: CN=LuxTrust Global Root, O=LuxTrust s.a., C=LU | |
Algorithm: RSA; Serial number: 0xbb8 | |
Valid from Thu Mar 17 11:51:37 EET 2011 until Wed Mar 17 11:51:37 EET 2021 | |
adding as trusted cert: | |
Subject: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US | |
Issuer: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US | |
Algorithm: RSA; Serial number: 0x15ac6e9419b2794b41f627a9c3180f1f | |
Valid from Wed Apr 02 03:00:00 EEST 2008 until Wed Dec 02 01:59:59 EET 2037 | |
adding as trusted cert: | |
Subject: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU | |
Issuer: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU | |
Algorithm: RSA; Serial number: 0xa3da427ea4b1aeda | |
Valid from Fri Aug 01 15:29:50 EEST 2008 until Sat Jul 31 15:29:50 EEST 2038 | |
adding as trusted cert: | |
Subject: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH | |
Issuer: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH | |
Algorithm: RSA; Serial number: 0x4f1bd42f54bb2f4b | |
Valid from Wed Oct 25 11:32:46 EEST 2006 until Sat Oct 25 11:32:46 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US | |
Issuer: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x4a538c28 | |
Valid from Tue Jul 07 20:25:54 EEST 2009 until Sat Dec 07 19:55:54 EET 2030 | |
adding as trusted cert: | |
Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0xce7e0e517d846fe8fe560fc1bf03039 | |
Valid from Fri Nov 10 02:00:00 EET 2006 until Mon Nov 10 02:00:00 EET 2031 | |
adding as trusted cert: | |
Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US | |
Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Jun 29 20:06:20 EEST 2004 until Thu Jun 29 20:06:20 EEST 2034 | |
adding as trusted cert: | |
Subject: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE | |
Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Tue May 30 13:48:38 EEST 2000 until Sat May 30 13:48:38 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE | |
Issuer: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Wed Oct 01 13:29:56 EEST 2008 until Sun Oct 02 02:59:59 EEST 2033 | |
adding as trusted cert: | |
Subject: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: EC; Serial number: 0x55556bcf25ea43535c3a40fd5ab4572 | |
Valid from Thu Aug 01 15:00:00 EEST 2013 until Fri Jan 15 14:00:00 EET 2038 | |
adding as trusted cert: | |
Subject: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Issuer: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US | |
Algorithm: RSA; Serial number: 0x44be0c8b500024b411d336252567c989 | |
Valid from Fri Jul 09 20:28:50 EEST 1999 until Tue Jul 09 20:36:58 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=Class 2 Primary CA, O=Certplus, C=FR | |
Issuer: CN=Class 2 Primary CA, O=Certplus, C=FR | |
Algorithm: RSA; Serial number: 0x85bd4bf3d8dae369f694d75fc3a54423 | |
Valid from Wed Jul 07 20:05:00 EEST 1999 until Sun Jul 07 02:59:59 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US | |
Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US | |
Algorithm: RSA; Serial number: 0x23456 | |
Valid from Tue May 21 07:00:00 EEST 2002 until Sat May 21 07:00:00 EEST 2022 | |
adding as trusted cert: | |
Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH | |
Issuer: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH | |
Algorithm: RSA; Serial number: 0x4eb200670c035d4f | |
Valid from Wed Oct 25 11:36:00 EEST 2006 until Sat Oct 25 11:36:00 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 | |
Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 | |
Algorithm: EC; Serial number: 0x605949e0262ebb55f90a778a71f94ad86c | |
Valid from Tue Nov 13 02:00:00 EET 2012 until Tue Jan 19 05:14:07 EET 2038 | |
adding as trusted cert: | |
Subject: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x6170cb498c5f984529e7b0a6d9505b7a | |
Valid from Fri Oct 01 03:00:00 EEST 1999 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Issuer: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Sep 01 03:00:00 EEST 2009 until Fri Jan 01 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US | |
Issuer: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US | |
Algorithm: RSA; Serial number: 0xa0142800000014523cf467c00000002 | |
Valid from Thu Jan 16 19:53:32 EET 2014 until Mon Jan 16 19:53:32 EET 2034 | |
adding as trusted cert: | |
Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net | |
Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net | |
Algorithm: RSA; Serial number: 0x3863def8 | |
Valid from Fri Dec 24 19:50:51 EET 1999 until Tue Jul 24 17:15:12 EEST 2029 | |
adding as trusted cert: | |
Subject: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US | |
Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x344ed55720d5edec49f42fce37db2b6d | |
Valid from Fri Nov 17 02:00:00 EET 2006 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Sep 01 03:00:00 EEST 2009 until Fri Jan 01 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x8b5b75568454850b00cfaf3848ceb1a4 | |
Valid from Fri Oct 01 03:00:00 EEST 1999 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: EC; Serial number: 0x2f80fe238c0e220f486712289187acb3 | |
Valid from Mon Nov 05 02:00:00 EET 2007 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US | |
Issuer: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x456b5054 | |
Valid from Mon Nov 27 22:23:42 EET 2006 until Fri Nov 27 22:53:42 EET 2026 | |
adding as trusted cert: | |
Subject: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0xb931c3ad63967ea6723bfc3af9af44b | |
Valid from Thu Aug 01 15:00:00 EEST 2013 until Fri Jan 15 14:00:00 EET 2038 | |
adding as trusted cert: | |
Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL | |
Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL | |
Algorithm: RSA; Serial number: 0x10020 | |
Valid from Tue Jun 11 13:46:39 EEST 2002 until Fri Jun 11 13:46:39 EEST 2027 | |
adding as trusted cert: | |
Subject: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE | |
Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Tue May 30 13:44:50 EEST 2000 until Sat May 30 13:44:50 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=DST Root CA X3, O=Digital Signature Trust Co. | |
Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. | |
Algorithm: RSA; Serial number: 0x44afb080d6a327ba893039862ef8406b | |
Valid from Sun Oct 01 00:12:19 EEST 2000 until Thu Sep 30 17:01:15 EEST 2021 | |
adding as trusted cert: | |
Subject: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO | |
Issuer: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO | |
Algorithm: RSA; Serial number: 0x2 | |
Valid from Tue Oct 26 11:38:03 EEST 2010 until Fri Oct 26 11:38:03 EEST 2040 | |
adding as trusted cert: | |
Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE | |
Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE | |
Algorithm: RSA; Serial number: 0x983f4 | |
Valid from Thu Nov 05 10:50:46 EET 2009 until Mon Nov 05 10:50:46 EET 2029 | |
adding as trusted cert: | |
Subject: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: EC; Serial number: 0xba15afa1ddfa0b54944afcd24a06cec | |
Valid from Thu Aug 01 15:00:00 EEST 2013 until Fri Jan 15 14:00:00 EET 2038 | |
adding as trusted cert: | |
Subject: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH | |
Issuer: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH | |
Algorithm: RSA; Serial number: 0xbb401c43f55e4fb0 | |
Valid from Wed Oct 25 11:30:35 EEST 2006 until Sat Oct 25 11:30:35 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US | |
Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US | |
Algorithm: EC; Serial number: 0x5c8b99c55a94c5d27156decd8980cc26 | |
Valid from Mon Feb 01 02:00:00 EET 2010 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US | |
Issuer: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US | |
Algorithm: RSA; Serial number: 0xa0142800000014523c844b500000002 | |
Valid from Thu Jan 16 20:12:23 EET 2014 until Mon Jan 16 20:12:23 EET 2034 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x509 | |
Valid from Fri Nov 24 20:27:00 EET 2006 until Mon Nov 24 20:23:33 EET 2031 | |
adding as trusted cert: | |
Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE | |
Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE | |
Algorithm: RSA; Serial number: 0x26 | |
Valid from Fri Jul 09 15:11:00 EEST 1999 until Wed Jul 10 02:59:00 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE | |
Issuer: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE | |
Algorithm: RSA; Serial number: 0x983f3 | |
Valid from Thu Nov 05 10:35:58 EET 2009 until Mon Nov 05 10:35:58 EET 2029 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x78585f2ead2c194be3370735341328b596d46593 | |
Valid from Thu Jan 12 19:27:44 EET 2012 until Sun Jan 12 19:27:44 EET 2042 | |
adding as trusted cert: | |
Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US | |
Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x3f691e819cf09a4af373ffb948a2e4dd | |
Valid from Mon Jan 29 02:00:00 EET 1996 until Thu Aug 03 02:59:59 EEST 2028 | |
adding as trusted cert: | |
Subject: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US | |
Issuer: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US | |
Algorithm: RSA; Serial number: 0x1fd6d30fca3ca51a81bbc640e35032d | |
Valid from Mon Feb 01 02:00:00 EET 2010 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0xb92f60cc889fa17a4609b85b706c8aaf | |
Valid from Mon May 18 03:00:00 EEST 1998 until Wed Aug 02 02:59:59 EEST 2028 | |
adding as trusted cert: | |
Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 | |
Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 | |
Algorithm: RSA; Serial number: 0x400000000010f8626e60d | |
Valid from Fri Dec 15 10:00:00 EET 2006 until Wed Dec 15 10:00:00 EET 2021 | |
adding as trusted cert: | |
Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x18dad19e267de8bb4a2158cdcc6b3b4a | |
Valid from Wed Nov 08 02:00:00 EET 2006 until Thu Jul 17 02:59:59 EEST 2036 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x5c6 | |
Valid from Fri Nov 24 21:11:23 EET 2006 until Mon Nov 24 21:06:44 EET 2031 | |
adding as trusted cert: | |
Subject: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Tue Sep 01 03:00:00 EEST 2009 until Fri Jan 01 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch | |
Issuer: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch | |
Algorithm: RSA; Serial number: 0x1e9e28e848f2e5efc37c4a1e5a1867b6 | |
Valid from Fri Jun 24 11:38:14 EEST 2011 until Wed Jun 25 10:38:14 EEST 2031 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d | |
Valid from Thu Jan 12 22:26:32 EET 2012 until Sun Jan 12 22:26:32 EET 2042 | |
adding as trusted cert: | |
Subject: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT | |
Issuer: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT | |
Algorithm: RSA; Serial number: 0x570a119742c4e3cc | |
Valid from Thu Sep 22 14:22:02 EEST 2011 until Sun Sep 22 14:22:02 EEST 2030 | |
adding as trusted cert: | |
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US | |
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x3c9131cb1ff6d01b0e9ab8d044bf12be | |
Valid from Mon Jan 29 02:00:00 EET 1996 until Thu Aug 03 02:59:59 EEST 2028 | |
adding as trusted cert: | |
Subject: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM | |
Issuer: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM | |
Algorithm: RSA; Serial number: 0x3ab6508b | |
Valid from Mon Mar 19 20:33:33 EET 2001 until Wed Mar 17 20:33:33 EET 2021 | |
adding as trusted cert: | |
Subject: CN=Class 3P Primary CA, O=Certplus, C=FR | |
Issuer: CN=Class 3P Primary CA, O=Certplus, C=FR | |
Algorithm: RSA; Serial number: 0xbf5cdbb6f21c6ec04deb7a023b36e879 | |
Valid from Wed Jul 07 20:10:00 EEST 1999 until Sun Jul 07 02:59:59 EEST 2019 | |
adding as trusted cert: | |
Subject: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO | |
Issuer: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO | |
Algorithm: RSA; Serial number: 0x2 | |
Valid from Tue Oct 26 11:28:58 EEST 2010 until Fri Oct 26 11:28:58 EEST 2040 | |
adding as trusted cert: | |
Subject: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP | |
Issuer: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP | |
Algorithm: RSA; Serial number: 0x0 | |
Valid from Wed Jun 06 05:12:32 EEST 2007 until Sat Jun 06 05:12:32 EEST 2037 | |
adding as trusted cert: | |
Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US | |
Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US | |
Algorithm: RSA; Serial number: 0x59e3 | |
Valid from Mon Jun 21 07:00:00 EEST 1999 until Mon Jun 22 07:00:00 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US | |
Issuer: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US | |
Algorithm: EC; Serial number: 0x35fc265cd9844fc93d263d579baed756 | |
Valid from Mon Nov 05 02:00:00 EET 2007 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch | |
Issuer: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch | |
Algorithm: RSA; Serial number: 0xf2fa64e27463d38dfd101d041f76ca58 | |
Valid from Fri Jun 24 12:45:08 EEST 2011 until Wed Jun 25 11:45:08 EEST 2031 | |
adding as trusted cert: | |
Subject: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Issuer: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x401ac46421b31321030ebbe4121ac51d | |
Valid from Wed Apr 02 03:00:00 EEST 2008 until Wed Dec 02 01:59:59 EET 2037 | |
adding as trusted cert: | |
Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE | |
Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Tue May 30 13:38:31 EEST 2000 until Sat May 30 13:38:31 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4 | |
Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4 | |
Algorithm: EC; Serial number: 0x2a38a41c960a04de42b228a50be8349802 | |
Valid from Tue Nov 13 02:00:00 EET 2012 until Tue Jan 19 05:14:07 EET 2038 | |
adding as trusted cert: | |
Subject: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU | |
Issuer: CN=Global Chambersign Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU | |
Algorithm: RSA; Serial number: 0xc9cdd3e9d57d23ce | |
Valid from Fri Aug 01 15:31:40 EEST 2008 until Sat Jul 31 15:31:40 EEST 2038 | |
adding as trusted cert: | |
Subject: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US | |
Issuer: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x600197b746a7eab4b49ad64b2ff790fb | |
Valid from Wed Apr 02 03:00:00 EEST 2008 until Wed Dec 02 01:59:59 EET 2037 | |
adding as trusted cert: | |
Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | |
Algorithm: RSA; Serial number: 0x4caaf9cadb636fe01ff74ed85b03869d | |
Valid from Tue Jan 19 02:00:00 EET 2010 until Tue Jan 19 01:59:59 EET 2038 | |
adding as trusted cert: | |
Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US | |
Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US | |
Algorithm: RSA; Serial number: 0x1a5 | |
Valid from Thu Aug 13 03:29:00 EEST 1998 until Tue Aug 14 02:59:00 EEST 2018 | |
adding as trusted cert: | |
Subject: [email protected], CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA | |
Issuer: [email protected], CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA | |
Algorithm: RSA; Serial number: 0x36122296c5e338a520a1d25f4cd70954 | |
Valid from Thu Aug 01 03:00:00 EEST 1996 until Sat Jan 02 01:59:59 EET 2021 | |
adding as trusted cert: | |
Subject: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US | |
Issuer: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US | |
Algorithm: EC; Serial number: 0x7497258ac73f7a54 | |
Valid from Fri Jan 29 16:20:24 EET 2010 until Mon Dec 31 16:20:24 EET 2040 | |
adding as trusted cert: | |
Subject: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE | |
Issuer: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE | |
Algorithm: RSA; Serial number: 0x1 | |
Valid from Wed Oct 01 13:40:14 EEST 2008 until Sun Oct 02 02:59:59 EEST 2033 | |
adding as trusted cert: | |
Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US | |
Algorithm: RSA; Serial number: 0x4cc7eaaa983e71d39310f83d3a899192 | |
Valid from Mon May 18 03:00:00 EEST 1998 until Wed Aug 02 02:59:59 EEST 2028 | |
adding as trusted cert: | |
Subject: CN=KEYNECTIS ROOT CA, OU=ROOT, O=KEYNECTIS, C=FR | |
Issuer: CN=KEYNECTIS ROOT CA, OU=ROOT, O=KEYNECTIS, C=FR | |
Algorithm: RSA; Serial number: 0x1121bc276c5547af584eefd4ced629b2a285 | |
Valid from Tue May 26 03:00:00 EEST 2009 until Tue May 26 03:00:00 EEST 2020 | |
adding as trusted cert: | |
Subject: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Issuer: CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US | |
Algorithm: RSA; Serial number: 0x33af1e6a711a9a0bb2864b11d09fae5 | |
Valid from Thu Aug 01 15:00:00 EEST 2013 until Fri Jan 15 14:00:00 EET 2038 | |
keyStore is : | |
keyStore type is : jks | |
keyStore provider is : | |
init keystore | |
init keymanager of type SunX509 | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=api.wolframalpha.com) was replaced with (type=host_name (0), value=api.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488390996 bytes = { 24, 213, 118, 134, 184, 11, 124, 66, 117, 234, 19, 198, 173, 37, 160, 43, 156, 64, 33, 217, 23, 119, 228, 104, 12, 83, 248, 97 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=api.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 232 | |
main, READ: TLSv1.2 Handshake, length = 93 | |
*** ServerHello, TLSv1.2 | |
RandomCookie: GMT: 1488390996 bytes = { 7, 67, 206, 30, 230, 34, 193, 95, 66, 145, 156, 104, 92, 167, 37, 108, 183, 57, 32, 224, 254, 67, 77, 68, 252, 79, 84, 193 } | |
Session ID: {170, 209, 94, 99, 36, 27, 51, 215, 96, 77, 34, 59, 29, 204, 100, 115, 131, 108, 142, 152, 159, 45, 215, 196, 68, 110, 135, 74, 128, 234, 73, 206} | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
Compression Method: 0 | |
Extension server_name, server_name: | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] | |
*** | |
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384] | |
** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
main, READ: TLSv1.2 Handshake, length = 4781 | |
*** Certificate chain | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=api.wolframalpha.com, OU=Domain Control Validated | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 23280782031383540697574475964973375899936786490040622889581698234819943784707580473755951740066906088102446559596940720134617480596875175607723435940024502576005573724171342536363547314491172967177694605337385004673350641440354903556937672303581683587085401639654267276120772639471198522618365476240201453435845335655716555144129106783393405445832347542757194388717237515124801624286119768583106818373870397538895349343400610867995768182455697403866506541070434347886296651130795674751421433903974031309636990931311364931245556005018464476244475571545406776151815528847988743688153421567688058158897316772902792014451 | |
public exponent: 65537 | |
Validity: [From: Wed Sep 23 23:35:39 EEST 2015, | |
To: Sun Sep 23 23:35:39 EEST 2018] | |
Issuer: CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
SerialNumber: [ 4171581f ce5d8d33] | |
Certificate Extensions: 9 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.godaddy.com/ | |
, | |
accessMethod: caIssuers | |
accessLocation: URIName: http://certificates.godaddy.com/repository/gdig2.crt | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 40 C2 BD 27 8E CC 34 83 30 A2 33 D7 FB 6C B3 F0 @..'..4.0.3..l.. | |
0010: B4 2C 80 CE .,.. | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:false | |
PathLen: undefined | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl.godaddy.com/gdig2s1-127.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.16.840.1.114413.1.7.23.1] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 2B 68 74 74 70 3A 2F 2F 63 65 72 74 69 66 69 .+http://certifi | |
0010: 63 61 74 65 73 2E 67 6F 64 61 64 64 79 2E 63 6F cates.godaddy.co | |
0020: 6D 2F 72 65 70 6F 73 69 74 6F 72 79 2F m/repository/ | |
]] ] | |
] | |
[6]: ObjectId: 2.5.29.37 Criticality=false | |
ExtendedKeyUsages [ | |
serverAuth | |
clientAuth | |
] | |
[7]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_Encipherment | |
] | |
[8]: ObjectId: 2.5.29.17 Criticality=false | |
SubjectAlternativeName [ | |
DNSName: api.wolframalpha.com | |
DNSName: www.api.wolframalpha.com | |
] | |
[9]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 57 60 69 B3 54 B0 36 53 2C FF 0E 2A 52 27 55 91 W`i.T.6S,..*R'U. | |
0010: 0C 8C 70 90 ..p. | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 3B 21 17 A8 6F AD 78 B1 B4 6A 51 E9 D2 7D B8 72 ;!..o.x..jQ....r | |
0010: 18 C5 3E 34 3F BD 6D 44 F2 4F 23 DA B9 B0 08 FE ..>4?.mD.O#..... | |
0020: 71 B7 39 B6 90 AD 0A 0E 8C ED 61 B6 A8 43 CC 4D q.9.......a..C.M | |
0030: 05 8D E9 1B 0A E2 D1 5A 4C 38 6C 7F 27 66 41 56 .......ZL8l.'fAV | |
0040: 7B C5 23 BE F2 D0 B4 9A 11 DC 21 C6 8B 8F C8 70 ..#.......!....p | |
0050: DB B4 2B D3 1A F8 43 11 EB C3 60 8B BF 3E 37 B6 ..+...C...`..>7. | |
0060: 24 56 A1 41 55 D5 36 03 8D 15 BF 4E 22 4A E3 3E $V.AU.6....N"J.> | |
0070: 71 07 D3 07 9B A6 6E 04 54 EA C5 CB A9 76 7B B5 q.....n.T....v.. | |
0080: 24 8F A9 5E 76 68 3C CE 64 08 9B D3 F5 15 D2 05 $..^vh<.d....... | |
0090: 99 BC EC 55 08 75 1E DE E9 03 81 41 E7 9E 60 93 ...U.u.....A..`. | |
00A0: 53 5C 98 CD 21 5C 0E 2E F6 16 85 04 8B 8F 2A 3A S\..!\........*: | |
00B0: BD F5 88 1E C1 6B 8A B0 7F 30 B2 34 53 5F 3B 3A .....k...0.4S_;: | |
00C0: B7 5F 0B 18 6F F2 CF 9D 85 89 83 F4 DA 34 0B D9 ._..o........4.. | |
00D0: 0F 01 FC B4 D7 CB 1B BD 8A D2 5B 83 E8 1B A5 DD ..........[..... | |
00E0: E3 A9 F8 E4 08 CB 25 34 11 AE 81 3C 2A 9A B2 B0 ......%4...<*... | |
00F0: A4 5A 11 3F A9 CD A2 10 B9 EE 12 08 A9 6C E0 93 .Z.?.........l.. | |
] | |
chain [1] = [ | |
[ | |
Version: V3 | |
Subject: CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 23464936089672074238558227240738642188401652750559322139110223472800898724452171193507830144175059459702529905676615071074993228771373136540482674196545025295733738196449583666610315977490986925474739841268554665863093665527055011951462798054655387514678326260004075182975117421140397782473200702068600919372009187240660911098390145147467211797777009862056159391483377819086435980778585967055870497149033762110952962582355410428105094882392320868563187123866160347835848217107617930191075074037337201254401445272297107644739005851884807909929228393436982535239808806968215135043030563617161016982313909247836020691707 | |
public exponent: 65537 | |
Validity: [From: Tue May 03 10:00:00 EEST 2011, | |
To: Sat May 03 10:00:00 EEST 2031] | |
Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
SerialNumber: [ 07] | |
Certificate Extensions: 7 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.godaddy.com/ | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 3A 9A 85 07 10 67 28 B6 EF F6 BD 05 41 6E 20 C1 :....g(.....An . | |
0010: 94 DA 0F DE .... | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl.godaddy.com/gdroot-g2.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 25 68 74 74 70 73 3A 2F 2F 63 65 72 74 73 2E .%https://certs. | |
0010: 67 6F 64 61 64 64 79 2E 63 6F 6D 2F 72 65 70 6F godaddy.com/repo | |
0020: 73 69 74 6F 72 79 2F sitory/ | |
]] ] | |
] | |
[6]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
Key_CertSign | |
Crl_Sign | |
] | |
[7]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 40 C2 BD 27 8E CC 34 83 30 A2 33 D7 FB 6C B3 F0 @..'..4.0.3..l.. | |
0010: B4 2C 80 CE .,.. | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 08 7E 6C 93 10 C8 38 B8 96 A9 90 4B FF A1 5F 4F ..l...8....K.._O | |
0010: 04 EF 6C 3E 9C 88 06 C9 50 8F A6 73 F7 57 31 1B ..l>....P..s.W1. | |
0020: BE BC E4 2F DB F8 BA D3 5B E0 B4 E7 E6 79 62 0E .../....[....yb. | |
0030: 0C A2 D7 6A 63 73 31 B5 F5 A8 48 A4 3B 08 2D A2 ...jcs1...H.;.-. | |
0040: 5D 90 D7 B4 7C 25 4F 11 56 30 C4 B6 44 9D 7B 2C ]....%O.V0..D.., | |
0050: 9D E5 5E E6 EF 0C 61 AA BF E4 2A 1B EE 84 9E B8 ..^...a...*..... | |
0060: 83 7D C1 43 CE 44 A7 13 70 0D 91 1F F4 C8 13 AD ...C.D..p....... | |
0070: 83 60 D9 D8 72 A8 73 24 1E B5 AC 22 0E CA 17 89 .`..r.s$...".... | |
0080: 62 58 44 1B AB 89 25 01 00 0F CD C4 1B 62 DB 51 bXD...%......b.Q | |
0090: B4 D3 0F 51 2A 9B F4 BC 73 FC 76 CE 36 A4 CD D9 ...Q*...s.v.6... | |
00A0: D8 2C EA AE 9B F5 2A B2 90 D1 4D 75 18 8A 3F 8A .,....*...Mu..?. | |
00B0: 41 90 23 7D 5B 4B FE A4 03 58 9B 46 B2 C3 60 60 A.#.[K...X.F..`` | |
00C0: 83 F8 7D 50 41 CE C2 A1 90 C3 BB EF 02 2F D2 15 ...PA......../.. | |
00D0: 54 EE 44 15 D9 0A AE A7 8A 33 ED B1 2D 76 36 26 T.D......3..-v6& | |
00E0: DC 04 EB 9F F7 61 1F 15 DC 87 6F EE 46 96 28 AD .....a....o.F.(. | |
00F0: A1 26 7D 0A 09 A7 2E 04 A3 8D BC F8 BC 04 30 01 .&............0. | |
] | |
chain [2] = [ | |
[ | |
Version: V3 | |
Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 24167427464505360470820084102544159780721800580815755821942541313685849243170608123266960399377040734093363378001913640372075758182560568293779974003207259616905465476409968651029104721804687140009095282235664291608481757006801631585235100187261305088538393609873332994641418673866781518963343337176362242808013099393015850452689876172098539782278811542282723984447275481973602854284857098397594038442417214202774541180584378459626040737239824794520897114133793884872625034414025897997798064801393507265260579064062354407517444727896235980463778378530561727249711443261565147692841071892608175158442558267639370866759 | |
public exponent: 65537 | |
Validity: [From: Wed Jan 01 09:00:00 EET 2014, | |
To: Fri May 30 10:00:00 EEST 2031] | |
Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US | |
SerialNumber: [ 1be715] | |
Certificate Extensions: 7 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.godaddy.com/ | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: D2 C4 B0 D2 91 D4 4C 11 71 B3 61 CB 3D A1 FE DD ......L.q.a.=... | |
0010: A8 6A D4 E3 .j.. | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl.godaddy.com/gdroot.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 25 68 74 74 70 73 3A 2F 2F 63 65 72 74 73 2E .%https://certs. | |
0010: 67 6F 64 61 64 64 79 2E 63 6F 6D 2F 72 65 70 6F godaddy.com/repo | |
0020: 73 69 74 6F 72 79 2F sitory/ | |
]] ] | |
] | |
[6]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
Key_CertSign | |
Crl_Sign | |
] | |
[7]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 3A 9A 85 07 10 67 28 B6 EF F6 BD 05 41 6E 20 C1 :....g(.....An . | |
0010: 94 DA 0F DE .... | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 59 0B 53 BD 92 86 11 A7 24 7B ED 5B 31 CF 1D 1F Y.S.....$..[1... | |
0010: 6C 70 C5 B8 6E BE 4E BB F6 BE 97 50 E1 30 7F BA lp..n.N....P.0.. | |
0020: 28 5C 62 94 C2 E3 7E 33 F7 FB 42 76 85 DB 95 1C (\b....3..Bv.... | |
0030: 8C 22 58 75 09 0C 88 65 67 39 0A 16 09 C5 A0 38 ."Xu...eg9.....8 | |
0040: 97 A4 C5 23 93 3F B4 18 A6 01 06 44 91 E3 A7 69 ...#.?.....D...i | |
0050: 27 B4 5A 25 7F 3A B7 32 CD DD 84 FF 2A 38 29 33 '.Z%.:.2....*8)3 | |
0060: A4 DD 67 B2 85 FE A1 88 20 1C 50 89 C8 DC 2A F6 ..g..... .P...*. | |
0070: 42 03 37 4C E6 88 DF D5 AF 24 F2 B1 C3 DF CC B5 B.7L.....$...... | |
0080: EC E0 99 5E B7 49 54 20 3C 94 18 0C C7 1C 52 18 ...^.IT <.....R. | |
0090: 49 A4 6D E1 B3 58 0B C9 D8 EC D9 AE 1C 32 8E 28 I.m..X.......2.( | |
00A0: 70 0D E2 FE A6 17 9E 84 0F BD 57 70 B3 5A E9 1F p.........Wp.Z.. | |
00B0: A0 86 53 BB EF 7C FF 69 0B E0 48 C3 B7 93 0B C8 ..S....i..H..... | |
00C0: 0A 54 C4 AC 5D 14 67 37 6C CA A5 2F 31 08 37 AA .T..].g7l../1.7. | |
00D0: 6E 6F 8C BC 9B E2 57 5D 24 81 AF 97 97 9C 84 AD no....W]$....... | |
00E0: 6C AC 37 4C 66 F3 61 91 11 20 E4 BE 30 9F 7A A4 l.7Lf.a.. ..0.z. | |
00F0: 29 09 B0 E1 34 5F 64 77 18 40 51 DF 8C 30 A6 AF )[email protected].. | |
] | |
chain [3] = [ | |
[ | |
Version: V3 | |
Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US | |
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 28102739193587910144578747474926408217849460363800059769223951720524877782041741206814911423228558955360273550499757906259671518004099520765014951710342298592828594215648283496685705855490136596556284497624159355722445661325558685724255457119849866960047300649739276088245842135049945657270566024419659967714792180533322290325493237615990789943804102556857126708160834541873295121355374279880919760855132464514833612683677734346873116224386523636584067816457746440087274922079695985771375478754749287534138904614797308931387620081006830724261176905964623808714847390685443399142146396075187534947801460897663166127023 | |
public exponent: 3 | |
Validity: [From: Tue Jun 29 20:06:20 EEST 2004, | |
To: Thu Jun 29 20:06:20 EEST 2034] | |
Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US | |
SerialNumber: [ 00] | |
Certificate Extensions: 3 | |
[1]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: D2 C4 B0 D2 91 D4 4C 11 71 B3 61 CB 3D A1 FE DD ......L.q.a.=... | |
0010: A8 6A D4 E3 .j.. | |
] | |
[OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US] | |
SerialNumber: [ 00] | |
] | |
[2]: ObjectId: 2.5.29.19 Criticality=false | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
[3]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: D2 C4 B0 D2 91 D4 4C 11 71 B3 61 CB 3D A1 FE DD ......L.q.a.=... | |
0010: A8 6A D4 E3 .j.. | |
] | |
] | |
] | |
Algorithm: [SHA1withRSA] | |
Signature: | |
0000: 32 4B F3 B2 CA 3E 91 FC 12 C6 A1 07 8C 8E 77 A0 2K...>........w. | |
0010: 33 06 14 5C 90 1E 18 F7 08 A6 3D 0A 19 F9 87 80 3..\......=..... | |
0020: 11 6E 69 E4 96 17 30 FF 34 91 63 72 38 EE CC 1C .ni...0.4.cr8... | |
0030: 01 A3 1D 94 28 A4 31 F6 7A C4 54 D7 F6 E5 31 58 ....(.1.z.T...1X | |
0040: 03 A2 CC CE 62 DB 94 45 73 B5 BF 45 C9 24 B5 D5 ....b..Es..E.$.. | |
0050: 82 02 AD 23 79 69 8D B8 B6 4D CE CF 4C CA 33 23 ...#yi...M..L.3# | |
0060: E8 1C 88 AA 9D 8B 41 6E 16 C9 20 E5 89 9E CD 3B ......An.. ....; | |
0070: DA 70 F7 7E 99 26 20 14 54 25 AB 6E 73 85 E6 9B .p...& .T%.ns... | |
0080: 21 9D 0A 6C 82 0E A8 F8 C2 0C FA 10 1E 6C 96 EF !..l.........l.. | |
0090: 87 0D C4 0F 61 8B AD EE 83 2B 95 F8 8E 92 84 72 ....a....+.....r | |
00A0: 39 EB 20 EA 83 ED 83 CD 97 6E 08 BC EB 4E 26 B6 9. ......n...N&. | |
00B0: 73 2B E4 D3 F6 4C FE 26 71 E2 61 11 74 4A FF 57 s+...L.&q.a.tJ.W | |
00C0: 1A 87 0F 75 48 2E CF 51 69 17 A0 02 12 61 95 D5 ...uH..Qi....a.. | |
00D0: D1 40 B2 10 4C EE C4 AC 10 43 A6 A5 9E 0A D5 95 [email protected]...... | |
00E0: 62 9A 0D CF 88 82 C5 32 0C E4 2B 9F 45 E6 0D 9F b......2..+.E... | |
00F0: 28 9C B1 B9 2A 5A 57 AD 37 0F AF 1D 7F DB BD 9F (...*ZW.7....... | |
] | |
*** | |
Found trusted certificate: | |
[ | |
[ | |
Version: V3 | |
Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 24167427464505360470820084102544159780721800580815755821942541313685849243170608123266960399377040734093363378001913640372075758182560568293779974003207259616905465476409968651029104721804687140009095282235664291608481757006801631585235100187261305088538393609873332994641418673866781518963343337176362242808013099393015850452689876172098539782278811542282723984447275481973602854284857098397594038442417214202774541180584378459626040737239824794520897114133793884872625034414025897997798064801393507265260579064062354407517444727896235980463778378530561727249711443261565147692841071892608175158442558267639370866759 | |
public exponent: 65537 | |
Validity: [From: Tue Sep 01 03:00:00 EEST 2009, | |
To: Fri Jan 01 01:59:59 EET 2038] | |
Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US | |
SerialNumber: [ 00] | |
Certificate Extensions: 3 | |
[1]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
[2]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
Key_CertSign | |
Crl_Sign | |
] | |
[3]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 3A 9A 85 07 10 67 28 B6 EF F6 BD 05 41 6E 20 C1 :....g(.....An . | |
0010: 94 DA 0F DE .... | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 99 DB 5D 79 D5 F9 97 59 67 03 61 F1 7E 3B 06 31 ..]y...Yg.a..;.1 | |
0010: 75 2D A1 20 8E 4F 65 87 B4 F7 A6 9C BC D8 E9 2F u-. .Oe......../ | |
0020: D0 DB 5A EE CF 74 8C 73 B4 38 42 DA 05 7B F8 02 ..Z..t.s.8B..... | |
0030: 75 B8 FD A5 B1 D7 AE F6 D7 DE 13 CB 53 10 7E 8A u...........S... | |
0040: 46 D1 97 FA B7 2E 2B 11 AB 90 B0 27 80 F9 E8 9F F.....+....'.... | |
0050: 5A E9 37 9F AB E4 DF 6C B3 85 17 9D 3D D9 24 4F Z.7....l....=.$O | |
0060: 79 91 35 D6 5F 04 EB 80 83 AB 9A 02 2D B5 10 F4 y.5._.......-... | |
0070: D8 90 C7 04 73 40 ED 72 25 A0 A9 9F EC 9E AB 68 [email protected]%......h | |
0080: 12 99 57 C6 8F 12 3A 09 A4 BD 44 FD 06 15 37 C1 ..W...:...D...7. | |
0090: 9B E4 32 A3 ED 38 E8 D8 64 F3 2C 7E 14 FC 02 EA ..2..8..d.,..... | |
00A0: 9F CD FF 07 68 17 DB 22 90 38 2D 7A 8D D1 54 F1 ....h..".8-z..T. | |
00B0: 69 E3 5F 33 CA 7A 3D 7B 0A E3 CA 7F 5F 39 E5 E2 i._3.z=....._9.. | |
00C0: 75 BA C5 76 18 33 CE 2C F0 2F 4C AD F7 B1 E7 CE u..v.3.,./L..... | |
00D0: 4F A8 C4 9B 4A 54 06 C5 7F 7D D5 08 0F E2 1C FE O...JT.......... | |
00E0: 7E 17 B8 AC 5E F6 D4 16 B2 43 09 0C 4D F6 A7 6B ....^....C..M..k | |
00F0: B4 99 84 65 CA 7A 88 E2 E2 44 BE 5C F7 EA 1C F5 ...e.z...D.\.... | |
] | |
main, READ: TLSv1.2 Handshake, length = 333 | |
*** ECDH ServerKeyExchange | |
Signature Algorithm SHA512withRSA | |
Server key: Sun EC public key, 256 bits | |
public x coord: 40762500251791561420034037601574831951313248189085315192601818873524916054005 | |
public y coord: 23898949552217597340021452818413159931511691275559511711734300628264210306612 | |
parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) | |
main, READ: TLSv1.2 Handshake, length = 4 | |
*** ServerHelloDone | |
*** ECDHClientKeyExchange | |
ECDH Public value: { 4, 166, 34, 136, 16, 44, 48, 49, 240, 162, 102, 224, 6, 248, 95, 71, 0, 52, 166, 217, 168, 61, 210, 58, 70, 144, 74, 227, 85, 81, 180, 138, 104, 9, 104, 11, 229, 187, 210, 133, 189, 140, 250, 143, 162, 186, 217, 159, 119, 18, 68, 133, 66, 172, 61, 242, 77, 240, 232, 193, 228, 0, 54, 38, 184 } | |
main, WRITE: TLSv1.2 Handshake, length = 70 | |
SESSION KEYGEN: | |
PreMaster Secret: | |
0000: E9 1C 1E DD E7 98 AF 61 56 8B F5 C2 83 91 39 E0 .......aV.....9. | |
0010: 15 D1 A4 DA B8 68 7B 7A 1E 01 43 86 13 B6 06 BD .....h.z..C..... | |
CONNECTION KEYGEN: | |
Client Nonce: | |
0000: 59 B7 0B 54 18 D5 76 86 B8 0B 7C 42 75 EA 13 C6 Y..T..v....Bu... | |
0010: AD 25 A0 2B 9C 40 21 D9 17 77 E4 68 0C 53 F8 61 .%.+.@!..w.h.S.a | |
Server Nonce: | |
0000: 59 B7 0B 54 07 43 CE 1E E6 22 C1 5F 42 91 9C 68 Y..T.C..."._B..h | |
0010: 5C A7 25 6C B7 39 20 E0 FE 43 4D 44 FC 4F 54 C1 \.%l.9 ..CMD.OT. | |
Master Secret: | |
0000: F8 24 0A 6D ED CD 86 D6 59 17 46 B4 B4 12 92 CF .$.m....Y.F..... | |
0010: C0 A8 4B 07 D3 01 EC 0E D9 04 3B 43 3D EB F4 47 ..K.......;C=..G | |
0020: D9 79 D8 DE 35 E5 AC 35 D9 DC 8B 71 FF DE CD 23 .y..5..5...q...# | |
Client MAC write Secret: | |
0000: B0 C8 ED E6 6A 76 44 DC AE B7 3F CE D1 F6 D2 11 ....jvD...?..... | |
0010: 96 0F 42 0C 23 C7 F4 31 2E 33 84 EC 6B E6 F8 5C ..B.#..1.3..k..\ | |
0020: 1D 4D 5A FE D0 33 1E 5B F1 48 58 24 2C 98 2A 35 .MZ..3.[.HX$,.*5 | |
Server MAC write Secret: | |
0000: AB B6 A4 B3 9F F9 E9 52 66 61 AF 80 C4 B6 C7 40 .......Rfa.....@ | |
0010: B8 D7 51 2E 7B 2C 2D 2A BC 2D 85 32 11 DC FA 95 ..Q..,-*.-.2.... | |
0020: 7C EB 27 41 57 2B 22 EB DB 83 AE 5F C6 74 DE D7 ..'AW+"...._.t.. | |
Client write key: | |
0000: 9E AC FE AA 82 55 77 78 7C 53 60 30 35 00 FF CE .....Uwx.S`05... | |
0010: 50 C1 9B 74 27 1A 76 65 78 F8 EA 7A C5 F2 8B ED P..t'.vex..z.... | |
Server write key: | |
0000: 75 A8 D1 08 9D 26 77 AD 0E 65 3A 9D 7E C1 DF AA u....&w..e:..... | |
0010: D5 BD 5C 3B 90 FE 93 FC 90 36 1A EC 50 F0 C4 53 ..\;.....6..P..S | |
... no IV derived for this protocol | |
main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 | |
*** Finished | |
verify_data: { 4, 147, 51, 230, 206, 117, 12, 12, 205, 36, 10, 201 } | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 96 | |
main, READ: TLSv1.2 Change Cipher Spec, length = 1 | |
main, READ: TLSv1.2 Handshake, length = 96 | |
*** Finished | |
verify_data: { 180, 173, 31, 96, 72, 57, 53, 14, 122, 223, 33, 247 } | |
*** | |
%% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384] | |
main, WRITE: TLSv1.2 Application Data, length = 240 | |
main, READ: TLSv1.2 Application Data, length = 336 | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] <--- HTTP/1.1 200 OK (7679ms) | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] connection: close | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] content-length: 7668 | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] content-type: text/xml;charset=utf-8 | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] date: Mon, 11 Sep 2017 22:16:58 GMT | |
2017-09-12 01:16:58.849 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] server: Apache-Coyote/1.1 | |
main, READ: TLSv1.2 Application Data, length = 4256 | |
2017-09-12 01:16:58.850 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] set-cookie: WR_SID=176.104.243.10.1505168213330456; path=/; max-age=315360000; domain=.wolframalpha.com | |
2017-09-12 01:16:58.850 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] | |
main, READ: TLSv1.2 Application Data, length = 3552 | |
main, called close() | |
main, called closeInternal(true) | |
main, SEND TLSv1.2 ALERT: warning, description = close_notify | |
main, WRITE: TLSv1.2 Alert, length = 80 | |
main, called closeSocket(true) | |
2017-09-12 01:16:58.856 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] <?xml version='1.0' encoding='UTF-8'?> | |
<queryresult success='true' | |
error='false' | |
numpods='17' | |
datatypes='AdministrativeDivision,City,Country,InternationalTransportation,Language,Religion,WorldDevelopment' | |
timedout='Data,Character' | |
timedoutpods='' | |
timing='5.1000000000000005' | |
parsetiming='0.12' | |
parsetimedout='false' | |
recalculate='https://www5b.wolframalpha.com/api/v2/recalc.jsp?id=MSPa6946207bebi543d6b1bb00001865ae2f49icd9a54815465364497204630' | |
id='MSPa6947207bebi543d6b1bb000029g1i173i9dii976' | |
host='https://www5b.wolframalpha.com' | |
server='41' | |
related='https://www5b.wolframalpha.com/api/v2/relatedQueries.jsp?id=MSPa6948207bebi543d6b1bb0000410c92h6aaa3a0f04815465364497204630' | |
version='2.6'> | |
<pod title='Input interpretation' | |
scanner='Identity' | |
id='Input' | |
position='100' | |
error='false' | |
numsubpods='1'> | |
<subpod title=''> | |
<img src='https://www5b.wolframalpha.com/Calculate/MSP/MSP6949207bebi543d6b1bb00001af58743h3hbcf58?MSPStoreType=image/gif&s=41' | |
alt='Ukraine' | |
title='Ukraine' | |
width='52' | |
height='18' /> | |
<plaintext>Ukraine</plaintext> | |
</subpod> | |
</pod> | |
<pod title='Name' | |
scanner='Data' | |
id='Identifiers:CountryData' | |
position='200' | |
error='false' | |
numsubpods='1'> | |
<subpod title=''> | |
<img src='https://www5b.wolframalpha.com/Calculate/MSP/MSP6950207bebi543d6b1bb000032ede6g6be7g8iig?MSPStoreType=image/gif&s=41' | |
alt='full native name | Ukrayina | |
internet code | .ua' | |
title='full native name | Ukrayina | |
internet code | .ua' | |
width='216' | |
height='68' /> | |
<plaintext>full native name | Ukrayina | |
internet code | .ua</plaintext> | |
</subpod> | |
<states count='1'> | |
<state name='More' | |
input='Identifiers:CountryData__More' /> | |
</states> | |
</pod> | |
<pod title='Flag' | |
scanner='Data' | |
id='Flag:CountryData' | |
position='300' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630' /> | |
<pod title='Location' | |
scanner='Data' | |
id='Location:CountryData' | |
position='400' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6952207bebi543d6b1bb00003e802a6b953g213b4815465364497204630' /> | |
<pod title='Geographic properties' | |
scanner='Data' | |
id='GeographicProperties:CountryData' | |
position='500' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6953207bebi543d6b1bb00002abf81gf20677e234815465364497204630' /> | |
<pod title='Bordering countries/regions' | |
scanner='Data' | |
id='BorderingCountries:CountryData' | |
position='600' | |
error='false' | |
numsubpods='1'> | |
<subpod title=''> | |
<img src='https://www5b.wolframalpha.com/Calculate/MSP/MSP6954207bebi543d6b1bb00004h829b408d60b694?MSPStoreType=image/gif&s=41' | |
alt='Belarus | Hungary | Moldova | Poland | Romania | Russia | Slovakia' | |
title='Belarus | Hungary | Moldova | Poland | Romania | Russia | Slovakia' | |
width='523' | |
height='18' /> | |
<plaintext>Belarus | Hungary | Moldova | Poland | Romania | Russia | Slovakia</plaintext> | |
</subpod> | |
<states count='1'> | |
<state name='Show border lengths' | |
input='BorderingCountries:CountryData__Show border lengths' /> | |
</states> | |
</pod> | |
<pod title='Demographics' | |
scanner='Data' | |
id='DemographicProperties:CountryData' | |
position='700' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6955207bebi543d6b1bb000029e56ii9c0i1fi024815465364497204630' /> | |
<pod title='Cultural properties' | |
scanner='Data' | |
id='CulturalProperties:CountryData' | |
position='800' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6956207bebi543d6b1bb00005f2fh9d3a8i0gi234815465364497204630' /> | |
<pod title='Capital city' | |
scanner='Data' | |
id='CapitalCity:CountryData' | |
position='900' | |
error='false' | |
numsubpods='1'> | |
<subpod title=''> | |
<img src='https://www5b.wolframalpha.com/Calculate/MSP/MSP6957207bebi543d6b1bb000064c1bg370731d1a1?MSPStoreType=image/gif&s=41' | |
alt='Kyiv, Kiev' | |
title='Kyiv, Kiev' | |
width='64' | |
height='18' /> | |
<plaintext>Kyiv, Kiev</plaintext> | |
</subpod> | |
<infos count='1'> | |
<info> | |
<link url='http://maps.google.com?ie=UTF8&z=12&t=k&ll=50.43%2C30.52&q=50.43%20N%2C%2030.52%20E' | |
text='Satellite image' /> | |
</info> | |
</infos> | |
</pod> | |
<pod title='Largest cities' | |
scanner='Data' | |
id='LargestCities:CountryData' | |
position='1000' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6958207bebi543d6b1bb000037g3bhcb54i069b74815465364497204630' /> | |
<pod title='Currency' | |
scanner='Data' | |
id='Currency:CountryData' | |
position='1100' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6959207bebi543d6b1bb00004a185h30316a0eb64815465364497204630' /> | |
<pod title='Economic properties' | |
scanner='Data' | |
id='EconomicProperties:WorldDevelopmentData' | |
position='1200' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6960207bebi543d6b1bb000049ag4f06g25511c64815465364497204630' /> | |
<pod title='Employment' | |
scanner='Data' | |
id='Employment:CountryData' | |
position='1300' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6961207bebi543d6b1bb00003b44f20cd8i321934815465364497204630' /> | |
<pod title='Business information' | |
scanner='Data' | |
id='BusinessInformation:CountryData' | |
position='1400' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6962207bebi543d6b1bb00000g64693f532b6d084815465364497204630' /> | |
<pod title='Media and telecommunications' | |
scanner='Data' | |
id='MediaAndTelecommunications:CountryData' | |
position='1500' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6963207bebi543d6b1bb00001f5384845ag272514815465364497204630' /> | |
<pod title='Transportation' | |
scanner='Data' | |
id='Transportation:CountryData' | |
position='1600' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6964207bebi543d6b1bb0000303d9ea727idaabh4815465364497204630' /> | |
<pod title='UN Human Development Index' | |
scanner='Data' | |
id='HDI:WorldDevelopmentData' | |
position='1700' | |
error='false' | |
numsubpods='0' | |
async='https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6965207bebi543d6b1bb00001342hifef1d12ca64815465364497204630' /> | |
<sources count='5'> | |
<source url='https://www.wolframalpha.com/sources/CityDataSourceInformationNotes.html' | |
text='City data' /> | |
<source url='https://www.wolframalpha.com/sources/CountryDataSourceInformationNotes.html' | |
text='Country data' /> | |
<source url='https://www.wolframalpha.com/sources/FinancialDataSourceInformationNotes.html' | |
text='Financial data' /> | |
<source url='https://www.wolframalpha.com/sources/InternationalTransportationDataSourceInformationNotes.html' | |
text='International transportation data' /> | |
<source url='https://www.wolframalpha.com/sources/WorldDevelopmentDataSourceInformationNotes.html' | |
text='World development data' /> | |
</sources> | |
</queryresult> | |
2017-09-12 01:16:58.856 [DEBUG] [ main] feign.Logger : [FullResultsApi#getFullResults] <--- END HTTP (7668-byte body) | |
2017-09-12 01:16:59.754 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 HTTP/1.1 | |
2017-09-12 01:16:59.754 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> END HTTP (0-byte body) | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391004 bytes = { 247, 46, 158, 45, 37, 229, 182, 129, 145, 42, 6, 129, 197, 12, 203, 157, 88, 47, 28, 118, 151, 149, 100, 174, 101, 117, 19, 24 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:00.354 [ WARN] [ main] c.g.n.w.f.client.NoSNIRetryableClient : Misconfigured wolfram server https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630. Retrying without NSI | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391004 bytes = { 44, 134, 150, 179, 145, 153, 221, 27, 165, 103, 127, 102, 252, 155, 222, 59, 93, 245, 137, 41, 205, 172, 241, 195, 144, 191, 116, 170 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:00.760 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- ERROR SSLProtocolException: handshake alert: unrecognized_name (1005ms) | |
2017-09-12 01:17:00.762 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
2017-09-12 01:17:00.762 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- END ERROR | |
2017-09-12 01:17:00.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> RETRYING | |
2017-09-12 01:17:00.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 HTTP/1.1 | |
2017-09-12 01:17:00.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> END HTTP (0-byte body) | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391005 bytes = { 68, 126, 122, 81, 47, 57, 90, 231, 113, 55, 114, 21, 255, 15, 37, 57, 170, 16, 122, 183, 138, 57, 188, 108, 7, 183, 112, 27 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:01.318 [ WARN] [ main] c.g.n.w.f.client.NoSNIRetryableClient : Misconfigured wolfram server https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630. Retrying without NSI | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391005 bytes = { 18, 75, 92, 100, 114, 236, 121, 206, 115, 221, 114, 69, 16, 175, 20, 238, 100, 139, 93, 179, 103, 208, 202, 196, 141, 10, 150, 26 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:01.727 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- ERROR SSLProtocolException: handshake alert: unrecognized_name (813ms) | |
2017-09-12 01:17:01.728 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
2017-09-12 01:17:01.728 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- END ERROR | |
2017-09-12 01:17:01.953 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> RETRYING | |
2017-09-12 01:17:01.953 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 HTTP/1.1 | |
2017-09-12 01:17:01.953 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> END HTTP (0-byte body) | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391006 bytes = { 86, 16, 30, 238, 109, 96, 100, 214, 202, 189, 242, 203, 90, 178, 39, 69, 191, 159, 88, 153, 192, 185, 83, 97, 127, 122, 176, 62 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:02.359 [ WARN] [ main] c.g.n.w.f.client.NoSNIRetryableClient : Misconfigured wolfram server https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630. Retrying without NSI | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391006 bytes = { 70, 115, 108, 238, 20, 38, 70, 237, 120, 118, 114, 75, 19, 248, 100, 131, 38, 152, 238, 230, 3, 113, 162, 216, 244, 71, 213, 13 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:02.767 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- ERROR SSLProtocolException: handshake alert: unrecognized_name (813ms) | |
2017-09-12 01:17:02.768 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
2017-09-12 01:17:02.768 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- END ERROR | |
2017-09-12 01:17:03.105 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> RETRYING | |
2017-09-12 01:17:03.105 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 HTTP/1.1 | |
2017-09-12 01:17:03.105 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> END HTTP (0-byte body) | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391007 bytes = { 239, 65, 142, 120, 211, 37, 51, 97, 148, 31, 180, 176, 70, 254, 245, 198, 71, 159, 19, 167, 200, 56, 67, 67, 48, 83, 69, 18 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:03.509 [ WARN] [ main] c.g.n.w.f.client.NoSNIRetryableClient : Misconfigured wolfram server https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630. Retrying without NSI | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391007 bytes = { 247, 61, 222, 44, 12, 50, 70, 104, 195, 246, 54, 147, 187, 226, 210, 109, 186, 47, 0, 156, 254, 133, 113, 178, 196, 26, 9, 62 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:03.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- ERROR SSLProtocolException: handshake alert: unrecognized_name (806ms) | |
2017-09-12 01:17:03.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
2017-09-12 01:17:03.912 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- END ERROR | |
2017-09-12 01:17:04.418 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> RETRYING | |
2017-09-12 01:17:04.418 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 HTTP/1.1 | |
2017-09-12 01:17:04.418 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] ---> END HTTP (0-byte body) | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391008 bytes = { 222, 90, 239, 38, 129, 219, 94, 69, 226, 158, 183, 241, 180, 179, 217, 11, 216, 29, 153, 44, 153, 128, 110, 253, 148, 6, 58, 228 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:04.822 [ WARN] [ main] c.g.n.w.f.client.NoSNIRetryableClient : Misconfigured wolfram server https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630. Retrying without NSI | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(60000) called | |
main, the previous server name in SNI (type=host_name (0), value=www5b.wolframalpha.com) was replaced with (type=host_name (0), value=www5b.wolframalpha.com) | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1488391009 bytes = { 174, 66, 247, 87, 66, 74, 178, 18, 127, 120, 243, 114, 198, 136, 88, 38, 93, 191, 226, 240, 157, 2, 235, 65, 223, 101, 18, 180 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA | |
Extension server_name, server_name: [type=host_name (0), value=www5b.wolframalpha.com] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 234 | |
main, READ: TLSv1.2 Alert, length = 2 | |
main, RECV TLSv1.2 ALERT: warning, unrecognized_name | |
SSL - handshake alert: unrecognized_name | |
main, handling exception: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
main, SEND TLSv1.2 ALERT: fatal, description = unexpected_message | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
main, called closeSocket() | |
2017-09-12 01:17:05.227 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- ERROR SSLProtocolException: handshake alert: unrecognized_name (809ms) | |
2017-09-12 01:17:05.228 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
2017-09-12 01:17:05.228 [DEBUG] [ main] feign.Logger : [AsyncPodApi#getAsyncPod] <--- END ERROR | |
feign.RetryableException: handshake alert: unrecognized_name executing GET https://www5b.wolframalpha.com/api/v2/asyncPod.jsp?id=MSPa6951207bebi543d6b1bb00001a602e9idc02776h4815465364497204630 | |
at feign.FeignException.errorExecuting(FeignException.java:67) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:104) | |
at feign.SynchronousMethodHandler.invoke(SynchronousMethodHandler.java:76) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy21.getAsyncPod(Unknown Source) | |
at com.github.nginate.wolframalpha.full.FullResultsApi.loadPodAsync(FullResultsApi.java:53) | |
at java.lang.invoke.MethodHandle.invokeWithArguments(MethodHandle.java:627) | |
at feign.DefaultMethodHandler.invoke(DefaultMethodHandler.java:60) | |
at feign.ReflectiveFeign$FeignInvocationHandler.invoke(ReflectiveFeign.java:103) | |
at com.sun.proxy.$Proxy7.loadPodAsync(Unknown Source) | |
at com.github.nginate.wolframalpha.FullResultsAsyncIT.retrieveAsyncPod(FullResultsAsyncIT.java:49) | |
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) | |
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) | |
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) | |
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) | |
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) | |
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) | |
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78) | |
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57) | |
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) | |
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) | |
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) | |
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) | |
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) | |
at org.junit.runners.ParentRunner.run(ParentRunner.java:363) | |
at org.junit.runner.JUnitCore.run(JUnitCore.java:137) | |
at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) | |
at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:47) | |
at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) | |
at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) | |
Caused by: javax.net.ssl.SSLProtocolException: handshake alert: unrecognized_name | |
at sun.security.ssl.ClientHandshaker.handshakeAlert(ClientHandshaker.java:1446) | |
at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2026) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1474) | |
at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:480) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.convertResponse(NoSNIRetryableClient.java:112) | |
at com.github.nginate.wolframalpha.feign.client.NoSNIRetryableClient.execute(NoSNIRetryableClient.java:42) | |
at feign.SynchronousMethodHandler.executeAndDecode(SynchronousMethodHandler.java:97) | |
... 32 more | |
Process finished with exit code -1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment