HandShakeStatus

I write a NIO Server program with SSL(JSSE).I encount some problem in here.
SSLEngineResult res = sslEngine.wrap(////);
HandshakeStatus hs = res.getHandshakeStatus();
HandshakeStatus hs2 = engine.getHandshakeStatus();
in my program ,hs = FINISH but hs2=NOT_HANDSHAKE,why it isn't same value? and why my program get a NOT_HANDSHAKE status?
my program :
package cn.com.infosec.isfw2.sfw;
import java.io.EOFException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.net.Socket;
import java.nio.ByteBuffer;
import java.nio.channels.SelectionKey;
import java.nio.channels.Selector;
import java.nio.channels.SocketChannel;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLEngineResult;
import javax.net.ssl.SSLException;
import javax.net.ssl.SSLEngineResult.HandshakeStatus;
import javax.net.ssl.SSLEngineResult.Status;
import com.sun.corba.se.pept.transport.OutboundConnectionCache;
import cn.com.infosec.isfw2.impl.DefaultProtocolHandler;
public class SSLSession extends SocketSession {
     private SocketChannel channel;
     private IOFilterChain filters;
     private ByteBuffer buffer = null;
     private Selector selector;
     //     private HashMap<String, Object> attributes;
     private SSLEngine sslEngine;
     private ProtocolHandler protocolHandler = null;
     private ByteBuffer inNetBuffer;
     private ByteBuffer outNetBuffer;
     // * Applicaton cleartext data to be read by application
     // private IoBuffer appBuffer;
     * Empty buffer used during initial handshake and close operations
     private final ByteBuffer emptyBuffer = ByteBuffer.allocate(0);
     private SSLEngineResult.HandshakeStatus handshakeStatus;
     private boolean initialHandshakeComplete;
     private boolean handshakeComplete;
     public SSLSession(SocketChannel channel, Selector sel, IOFilterChain chain) {
          super(channel, sel, chain);
          this.channel = channel;
          this.filters = chain;
          this.selector = sel;
          buffer = null;
          //          attributes = null;
          filters.SessionCreate(this);
          System.out.println("----create ssl session--------");
          System.out.println("create session,channel=" + this.channel);
     public void read() throws IOException {
          if (buffer == null) {
               buffer = ByteBuffer.allocate(8192);
          if (buffer.position() == buffer.capacity()) {
               adjustBuffer(2 * buffer.capacity());
          int readbytes = 0;
          int ret = 0;
          while (true) {
               ret = read0();
               System.out.println("buffer=" + buffer);
               if (ret > 0) {
                    readbytes += ret;
                    if (buffer.position() == buffer.capacity()) {
                         adjustBuffer(2 * buffer.capacity());
                         System.out.println(Thread.currentThread().getName()
                                   + " session " + this + " channel " + channel
                                   + " buffer=" + buffer + " buffer is full " + " "
                                   + System.nanoTime());
               } else if (ret == 0) {
                    break;
               } else {
                    throw new EOFException("peer connection close.");
          if (protocolHandler == null) {
               protocolHandler = new DefaultProtocolHandler();
          if (protocolHandler.isAllDataRecved(buffer)) {
               final SocketSession s = this;
               try {
                    Runnable r = new Runnable() {
                         public void run() {
                              filters.DataReceived(s);
                    System.out.println(channel.socket().getInetAddress());
                    //if(channel.socket().getInetAddress().isAnyLocalAddress()){
                    Socket s1 = channel.socket();
                    if (s1.getInetAddress().isLoopbackAddress()) {
                         System.out.println("---is local----");
                         new Thread(r).start();
                    } else {
                         ExcuterManager.parserExe.execute(r);
               } catch (Throwable e) {
                    this.close();
          } else {
               continueRead();
     public SocketChannel getChannel() {
          return channel;
     public ByteBuffer getBuffer() {
          return buffer;
     public void continueRead() throws IOException {
          channel.register(selector, SelectionKey.OP_READ, this);
     public void adjustBuffer(int len) {
          if (len > buffer.position()) {
               ByteBuffer newBuffer = ByteBuffer.allocate(len);
               buffer.flip();
               newBuffer.put(buffer);
               buffer = newBuffer;
     //     public void sendData(ByteBuffer buff) throws IOException{
     //          buffer.clear();
     //          continueRead();
     //          OutputWriter.flushChannel(channel, buff);
     public ProtocolHandler getProtocolHandler() {
          return protocolHandler;
     public void setProtocolHandler(ProtocolHandler protocolHandler) {
          this.protocolHandler = protocolHandler;
     public void close() {
          buffer = null;
          filters = null;
          try {
               channel.close();
          } catch (Throwable e) {
          channel = null;
          selector = null;
          protocolHandler = null;
          //          attributes = null;
     public void setSslc(SSLContext sslc) {
          this.sslEngine = sslc.createSSLEngine();
          System.out.println("setsslc,sslengine=" + sslEngine);
          sslEngine.setUseClientMode(false);
          sslEngine.setNeedClientAuth(false);
          sslEngine.setWantClientAuth(false);
//          SSLSession session1 = sslEngine.getSession();
          //ByteBuffer myAppData = ByteBuffer.allocate(sslEngine.getSession().getApplicationBufferSize());
          ByteBuffer myNetData = ByteBuffer.allocate(sslEngine.getSession().getPacketBufferSize());
          ByteBuffer peerNetData = ByteBuffer.allocate(sslEngine.getSession().getPacketBufferSize());
          try {
               doHandshake(channel,sslEngine,myNetData,peerNetData);
          } catch (Exception e) {
               // TODO Auto-generated catch block
               e.printStackTrace();
          HandshakeStatus hs = sslEngine.getHandshakeStatus();
          System.out.println("in setsslcontext,shakehand status=" + hs);
          //writingEncryptedData = false;
     public SSLEngine getSslEngine() {
          return sslEngine;
     public int read0() throws IOException {
          int dd = channel.read(inNetBuffer);
          SSLEngineResult res = sslEngine.unwrap(inNetBuffer, buffer);
          System.out.println("in read0,status=" + res);
          return dd;
     public void sendData(ByteBuffer buff) throws IOException {
          //sslEngine.wrap(buff, outNetBuffer);
          OutputWriter.flushChannel(channel, outNetBuffer);
     void doHandshake(SocketChannel socketChannel, SSLEngine engine,
     ByteBuffer myNetData, ByteBuffer peerNetData) throws Exception {
     int appBufferSize = engine.getSession().getApplicationBufferSize();
     ByteBuffer myAppData = ByteBuffer.allocate(appBufferSize);
     ByteBuffer peerAppData = ByteBuffer.allocate(appBufferSize);
     // Begin handshake
     engine.beginHandshake();
     SSLEngineResult.HandshakeStatus hs = engine.getHandshakeStatus();
     // Process handshaking message
     while ((hs = engine.getHandshakeStatus()) != SSLEngineResult.HandshakeStatus.FINISHED &&
     (hs = engine.getHandshakeStatus()) != SSLEngineResult.HandshakeStatus.NOT_HANDSHAKING) {
     switch (hs) {
     case NEED_UNWRAP:
     // Receive handshaking data from peer
     if (socketChannel.read(peerNetData) < 0) {
     // Handle closed channel
     // Process incoming handshaking data
     peerNetData.flip();
     SSLEngineResult res = engine.unwrap(peerNetData, peerAppData);
     peerNetData.compact();
     hs = res.getHandshakeStatus();
     // Check status
     switch (res.getStatus()) {
     case OK :
//     if( hs == SSLEngineResult.HandshakeStatus.FINISHED ){
//          break myio;
     break;
     case BUFFER_OVERFLOW:
          System.out.println("---------overflow-------");
          break;
     case BUFFER_UNDERFLOW:
          System.out.println("---------underflow-------");
          break;
     // Handle other status: BUFFER_UNDERFLOW, BUFFER_OVERFLOW, CLOSED
     break;
     case NEED_WRAP :
     // Empty the local network packet buffer.
     myNetData.clear();
     // Generate handshaking data
     res = engine.wrap(myAppData, myNetData);
     hs = res.getHandshakeStatus();
     //HandshakeStatus hs2 = engine.getHandshakeStatus();
     // Check status
     switch (res.getStatus()) {
     case OK :
//     if( hs == SSLEngineResult.HandshakeStatus.FINISHED ){
//          break myio;
     myNetData.flip();
     // Send the handshaking data to peer
     while (myNetData.hasRemaining()) {
     if (socketChannel.write(myNetData) < 0) {
     // Handle closed channel
     break;
     // Handle other status: BUFFER_OVERFLOW, BUFFER_UNDERFLOW, CLOSED
     break;
     case NEED_TASK :
          new Thread( sslEngine.getDelegatedTask() ).start();
          // Handle blocking tasks
     break;
     // Handle other status: // FINISHED or NOT_HANDSHAKING
     // Processes after handshaking
}

I write a NIO Server program with SSL(JSSE).You have tackled a seriously difficult problem.
in my program ,hs = FINISH but hs2=NOT_HANDSHAKEYou mean NOT_HANDSHAKING.
why it isn't same value?Because FINISHED is only delivered once. See the Javadoc.

Similar Messages

  • Someone please review...Is this a bug in SSLEngine?

    I have been dealing with this for days and finally wrote a JUnit test just against the SSLEngine itself. I am about to file a bug report, but can someone please verify that they are having the same problem.
    Basically, on a rehanshake, just after a Runnable is retrieved and before it is run, the SSLEngine will not unwrap data. Here is an excerpt from the unit test....
              result = server.unwrap(encPacket, unencrPacket);
              assertEquals(HandshakeStatus.NEED_TASK, result.getHandshakeStatus());
              assertEquals(Status.OK, result.getStatus());     
              r = serverEngine.getDelegatedTask(); //get task but don't run it yet...wait until after decrypt of real data
              ByteBuffer dataOut = ByteBuffer.allocate(server.getSession().getApplicationBufferSize());
              dataOut.clear();
              helper.doneFillingBuffer(encData);
              log.fine("datain1="+encData+" out="+dataOut);
              result = serverEngine.unwrap(encData, dataOut);
              log.fine("datain2="+encData+" out="+dataOut);
              assertEquals(HandshakeStatus.NEED_TASK, result.getHandshakeStatus());
              assertEquals(Status.OK, result.getStatus());
    FINE: datain1=java.nio.HeapByteBuffer[pos=0 lim=37 cap=16665] out=java.nio.HeapByteBuffer[pos=0 lim=16384 cap=16384]
    Jul 4, 2005 3:45:50 PM biz.xsoftware.impl.nio.secure.test.TestNewAsynchSSLEngine testRawSSLEngine
    FINE: datain2=java.nio.HeapByteBuffer[pos=0 lim=37 cap=16665] out=java.nio.HeapByteBuffer[pos=0 lim=16384 cap=16384]Notice the status of the engine is still status=OK and handshake=NEED_TASK after trying to read the data that came in after the Runnable was retrieved. The log statements log that the encData was not even read from and the dataOut was not read to. Here are the logs proving that encData and dataOut wasn't touched at all.......
    FINE: datain1=java.nio.HeapByteBuffer[pos=0 lim=37 cap=16665] out=java.nio.HeapByteBuffer[pos=0 lim=16384 cap=16384]
    Jul 4, 2005 3:45:50 PM biz.xsoftware.impl.nio.secure.test.TestNewAsynchSSLEngine testRawSSLEngine
    FINE: datain2=java.nio.HeapByteBuffer[pos=0 lim=37 cap=16665] out=java.nio.HeapByteBuffer[pos=0 lim=16384 cap=16384]This may be "by design" such that data backs up until the Runnable is run which in myopinion is slightly dangerous.
    Full code of JUnit test(not real implementation code, just reproduction of problem with SSLEngine unit test) can be found at
    http://forum.java.sun.com/thread.jspa?threadID=641529&tstart=0
    thanks,
    dean

    actually, I was thinking the status after trying to
    unwrap my application data would have been...
    handShakeState = NEED_TASK (since Runnable hadn't
    been run yet).
    status = BUFFER_UNDERFLOW or OK(depending on if the
    application data had been decrypted or the engine
    needed more data to decrypt the packet)
    It seemed they had enough status to handle this
    situation to me but I could be missing something else.You are right about this: I was thinking more about the internal SSLEngine state-machine states, if it really is a state machine. So, I have now had a look and there is an internal RENEGOTIATE state which is supposed to allow concurrent data and re-handshake, and from a very quick look at Sun's code this should work for both input and output of app data during renegotiation, so I am going to have another look at your code ...
    One thing, the engine won't receive data in between the 2nd-last and the last WRAP of a re-handshake: this would be a TLS protocol violation (the Finished message must immediately follow the change_cipher_spec message).
    I also found the following comment in the output code which I will risk Sun's wrath by quoting:
         * If we have a task outstanding, this MUST be done before
         * doing any more wrapping, because we could be in the middle
         * of receiving a handshake message, for example, a finished
         * message which would change the ciphers.
         */

  • Trying to implement EAP/TLS using java (as part of RADIUS server)

    Hi
    This is a cross port since I didn't know which forum to post in!
    I'm trying to implement a RADIUS server (EAP/TLS) as part of my master thesis. I'm not used to Java SSL libraries and can't get it to work. The server will respond to an accesspoint that uses 802.1x. I have created certificates using openssl and imported the "cert-clt.pl2"and "root.pem" to a laptop trying to connect to the accesspoint. On the server side i imported the "cacert.pem" and "cert-srv.der" using keytool to a keystore. In my code I read the keystore and create the SSLEngine with following code:
              KeyStore ksKeys = KeyStore.getInstance("JKS");
                ksKeys.load(new FileInputStream("certs/FeebeeCommunity.keystore"), passphrase);
                KeyManagerFactory kmf = KeyManagerFactory.getInstance("SunX509");
                kmf.init(ksKeys, passphrase);
                KeyStore ksTrust = KeyStore.getInstance("JKS");
                ksTrust.load(new FileInputStream("FeebeeCommunity.keystore"), passphrase);
                TrustManagerFactory tmf = TrustManagerFactory.getInstance("SunX509");
                tmf.init(ksKeys);
                sslContext = SSLContext.getInstance("TLS");
                sslContext.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);
                sslEngine = sslContext.createSSLEngine();
                sslEngine.setUseClientMode(false);
                sslEngine.setNeedClientAuth(true);
                sslEngine.setWantClientAuth(true);
                sslEngine.setEnableSessionCreation(true);
                appBuffer = ByteBuffer.allocate(sslEngine.getSession().getApplicationBufferSize());
                appBuffer.clear();
                netBuffer = ByteBuffer.allocate(sslEngine.getSession().getPacketBufferSize());
                netBuffer.clear();All I want to do with TLS is a handshake.
    I'm not talking ssl using sockets instead I receive and send all TLS data encapsulated in EAP packet that are incapsulated in RADIUS packets. I start off with sending TLS-Start upon I recive TLS data. I handle it with the following code:
           SSLEngineResult result = null;
            SSLEngineResult.HandshakeStatus hsStatus = null;
            if( internalState != EAPTLSState.Handshaking ) {
                if( internalState == EAPTLSState.None ) {
                    TLSPacket tlsPacket = new TLSPacket( packet.getData() );
                    peerIdentity = tlsPacket.getData();
                    internalState = EAPTLSState.Starting;
                    try {
                        sslEngine.beginHandshake();
                    } catch (SSLException e) {
                        e.printStackTrace();
                    return;
                else if(internalState == EAPTLSState.Starting ) {
                    internalState = EAPTLSState.Handshaking;
                    try {
                        sslEngine.beginHandshake();
                    } catch (SSLException e) {
                        e.printStackTrace();
            TLSPacket tlsPacket = new TLSPacket( packet.getData() );
            netBuffer.put( tlsPacket.getData() );
            netBuffer.flip();
            while(true) {
                hsStatus = sslEngine.getHandshakeStatus();
                if(hsStatus == SSLEngineResult.HandshakeStatus.NEED_TASK) {
                    Runnable task;
                    while((task=sslEngine.getDelegatedTask()) != null) {
                        new Thread(task).start();
                else if(hsStatus == SSLEngineResult.HandshakeStatus.NEED_UNWRAP) {
                    try {
                        result = sslEngine.unwrap( netBuffer, appBuffer );
                    } catch (SSLException e) {
                        e.printStackTrace();
                else {
                    return;
            }When I try to send data I use the following code:
               SSLEngineResult.HandshakeStatus hsStatus = null;
                SSLEngineResult result = null;
    //            netBuffer = ByteBuffer.allocate(EAPTLSMethod.BUFFER_SIZE);
                netBuffer.clear();
                while(true) {
                    hsStatus = sslEngine.getHandshakeStatus();
                    if(hsStatus == SSLEngineResult.HandshakeStatus.NEED_TASK) {
                        Runnable task;
                        while((task=sslEngine.getDelegatedTask()) != null) {
                            new Thread(task).start();
                    else if(hsStatus == SSLEngineResult.HandshakeStatus.NEED_WRAP) {
                        try {
                            result = sslEngine.wrap( dummyBuffer, netBuffer );
                        } catch (SSLException e) {
                            e.printStackTrace();
                    else {
                        if( result != null && result.getStatus() == SSLEngineResult.Status.OK ) {
                            int size = Math.min(result.bytesProduced(),this.MTU);
                            byte [] tlsData = new byte[size];
                            netBuffer.flip();
                            netBuffer.get(tlsData,0,size);
                            TLSPacket tlsPacket = new TLSPacket((byte)0,tlsData);
                            if( size < result.bytesProduced() ) {
                                tlsPacket.setFlag(TLSFlag.MoreFragments);
                            return new EAPTLSRequestPacket( ID,
                                    (short)(tlsPacket.getData().length + 6),
                                    stateMachine.getCurrentMethod(), tlsPacket );
                        else {
                            return null;
                    }After I sent TLS-Start I receive data and manage to process it but when then trying to produce TLS data I get the following error:
    javax.net.ssl.SSLHandshakeException: no cipher suites in common
    at com.sun.net.ssl.internal.ssl.Handshaker.checkThrown(Handshaker.java:992)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:459)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.writeAppRecord(SSLEngineImpl.java:1054)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.wrap(SSLEngineImpl.java:1026)
    at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:411)
    at RadiusServerSimulator.EAPModule.EAPTLSMethod.buildReq(EAPTLSMethod.java:125)
    at RadiusServerSimulator.EAPModule.EAPStateMachine.methodRequest(EAPStateMachine.java:358)
    at RadiusServerSimulator.EAPModule.EAPStateMachine.run(EAPStateMachine.java:262)
    at java.lang.Thread.run(Thread.java:595)
    Caused by: javax.net.ssl.SSLHandshakeException: no cipher suites in common
    at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:150)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1352)
    at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:176)
    at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:164)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.chooseCipherSuite(ServerHandshaker.java:638)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.clientHello(ServerHandshaker.java:450)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:178)
    at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:495)
    at com.sun.net.ssl.internal.ssl.Handshaker$1.run(Handshaker.java:437)
    at java.security.AccessController.doPrivileged(Native Method)
    at com.sun.net.ssl.internal.ssl.Handshaker$DelegatedTask.run(Handshaker.java:930)
    Any help wold be most greatfull, if any questions or anything unclear plz let me know.
    add some additional information here is a debug output
    Before this I have sent a TLS-star package and this is when I receive new information and then try to create the answer
    [Raw read]: length = 5
    0000: 16 03 01 00 41 ....A
    [Raw read]: length = 65
    0000: 01 00 00 3D 03 01 41 A4 FC 16 A8 14 89 F0 59 81 ...=..A.......Y.
    0010: C8 C9 29 C2 09 D1 0A 70 18 58 DC 2E B0 C8 14 90 ..)....p.X......
    0020: D4 FD A4 C6 32 C9 00 00 16 00 04 00 05 00 0A 00 ....2...........
    0030: 09 00 64 00 62 00 03 00 06 00 13 00 12 00 63 01 ..d.b.........c.
    0040: 00 .
    Thread-2, READ: TLSv1 Handshake, length = 65
    *** ClientHello, TLSv1
    RandomCookie: GMT: 1084488726 bytes = { 168, 20, 137, 240, 89, 129, 200, 201, 4
    1, 194, 9, 209, 10, 112, 24, 88, 220, 46, 176, 200, 20, 144, 212, 253, 164, 198,
    50, 201 }
    Session ID: {}
    Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH
    _3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA,
    SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EX
    PORT_WITH_RC2_CBC_40_MD5, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_DE
    S_CBC_SHA, SSL_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA]
    Compression Methods: { 0 }
    [read] MD5 and SHA1 hashes: len = 65
    0000: 01 00 00 3D 03 01 41 A4 FC 16 A8 14 89 F0 59 81 ...=..A.......Y.
    0010: C8 C9 29 C2 09 D1 0A 70 18 58 DC 2E B0 C8 14 90 ..)....p.X......
    0020: D4 FD A4 C6 32 C9 00 00 16 00 04 00 05 00 0A 00 ....2...........
    0030: 09 00 64 00 62 00 03 00 06 00 13 00 12 00 63 01 ..d.b.........c.
    0040: 00 .
    Thread-5, fatal error: 40: no cipher suites in common
    javax.net.ssl.SSLHandshakeException: no cipher suites in common
    Thread-5, SEND TLSv1 ALERT: fatal, description = handshake_failure
    Thread-5, WRITE: TLSv1 Alert, length = 2
    Thread-2, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeEx
    ception: no cipher suites in common
    javax.net.ssl.SSLHandshakeException: no cipher suites in common
    at com.sun.net.ssl.internal.ssl.Handshaker.checkThrown(Handshaker.java:9
    92)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineI
    mpl.java:459)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.writeAppRecord(SSLEngineIm
    pl.java:1054)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.wrap(SSLEngineImpl.java:10
    26)
    at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:411)
    at RadiusServerSimulator.EAPModule.EAPTLSMethod.buildReq(EAPTLSMethod.ja
    va:153)
    at RadiusServerSimulator.EAPModule.EAPStateMachine.methodRequest(EAPStat
    eMachine.java:358)
    at RadiusServerSimulator.EAPModule.EAPStateMachine.run(EAPStateMachine.j
    ava:262)
    at java.lang.Thread.run(Thread.java:595)
    Caused by: javax.net.ssl.SSLHandshakeException: no cipher suites in common
    at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:150)
    at com.sun.net.ssl.internal.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1
    352)
    at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:176)
    at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:164)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.chooseCipherSuite(Serve
    rHandshaker.java:638)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.clientHello(ServerHands
    haker.java:450)
    at com.sun.net.ssl.internal.ssl.ServerHandshaker.processMessage(ServerHa
    ndshaker.java:178)
    at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:4
    95)
    at com.sun.net.ssl.internal.ssl.Handshaker$1.run(Handshaker.java:437)
    at java.security.AccessController.doPrivileged(Native Method)
    at com.sun.net.ssl.internal.ssl.Handshaker$DelegatedTask.run(Handshaker.
    java:930)
    ... 1 more

    I am developing a simple client/server SSL app using sdk 1.4 (no SSLEngine) and am faced with the same problem. Could anybody track down the problem further?

  • OSB11g, BEA-398205, java.lang.NullPointerException

    Hellow.
    I'm trying call a ws with a business service
    and htps...and gives the next error...
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573582570> <BEA-000000> <SSLIOContextTable.findContext(sock): 121603878>
    ####<30-sep-2013 22H39' CEST> <Info> <OSB Kernel> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573582572> <BEA-398205> <
    [Rastreo de OSB] La petición saliente ha causado una excepción
    Service Ref = xxxxxx/Bussines/xxxxxx
    URI = https://XXXX.XXX.XXX.XX:8443/axis/services/XXX
    Error Message = java.lang.NullPointerException
    Payload =
    >
    I don't understand what happen...the osb configuration is practically the same in development and production, but in production don't works....
    Anyone can help me?
    Thank's
    My initial parameters  are..
    common.components.home = /usr/oracle/Middleware/oracle_common
    domain.home = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain
    em.oracle.home = /usr/oracle/Middleware/oracle_common
    file.encoding = UTF-8
    file.encoding.pkg = sun.io
    file.separator = /
    igf.arisidbeans.carmlloc = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/fmwconfig/carml
    igf.arisidstack.home = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/fmwconfig/arisidprovider
    java.awt.graphicsenv = sun.awt.X11GraphicsEnvironment
    java.awt.headless = true
    java.awt.printerjob = sun.print.PSPrinterJob
    java.class.path = /usr/oracle/Middleware/oracle_common/modules/oracle.jdbc_11.1.1/ojdbc6dms.jar::/usr/oracle/Middleware/Oracle_OSB1/lib/osb-server-modules-ref.jar:/usr/oracle/Middleware/patch_wls1035/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/usr/oracle/Middleware/patch_ocp360/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/usr/oracle/jdk6/lib/tools.jar:/usr/oracle/Middleware/wlserver_10.3/server/lib/weblogic_sp.jar:/usr/oracle/Middleware/wlserver_10.3/server/lib/weblogic.jar:/usr/oracle/Middleware/modules/features/weblogic.server.modules_10.3.5.0.jar:/usr/oracle/Middleware/wlserver_10.3/server/lib/webservices.jar:/usr/oracle/Middleware/modules/org.apache.ant_1.7.1/lib/ant-all.jar:/usr/oracle/Middleware/modules/net.sf.antcontrib_1.1.0.0_1-0b2/lib/ant-contrib.jar:/usr/oracle/Middleware/oracle_common/soa/modules/commons-cli-1.1.jar:/usr/oracle/Middleware/oracle_common/soa/modules/oracle.soa.mgmt_11.1.1/soa-infra-mgmt.jar:/usr/oracle/Middleware/Oracle_OSB1/soa/modules/oracle.soa.common.adapters_11.1.1/oracle.soa.common.adapters.jar:/usr/oracle/Middleware/oracle_common/modules/oracle.jrf_11.1.1/jrf.jar:/usr/oracle/Middleware/Oracle_OSB1/lib/version.jar:/usr/oracle/Middleware/Oracle_OSB1/lib/alsb.jar:/usr/oracle/Middleware/Oracle_OSB1/3rdparty/lib/j2ssh-ant.jar:/usr/oracle/Middleware/Oracle_OSB1/3rdparty/lib/j2ssh-common.jar:/usr/oracle/Middleware/Oracle_OSB1/3rdparty/lib/j2ssh-core.jar:/usr/oracle/Middleware/Oracle_OSB1/3rdparty/lib/j2ssh-dameon.jar:/usr/oracle/Middleware/Oracle_OSB1/3rdparty/classes:/usr/oracle/Middleware/Oracle_OSB1/lib/external/log4j_1.2.8.jar:/usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/osb:/usr/oracle/Middleware/wlserver_10.3/common/derby/lib/derbyclient.jar:/usr/oracle/Middleware/wlserver_10.3/server/lib/xqrl.jar
    java.class.version = 50.0
    java.endorsed.dirs = /usr/java/jdk1.6.0_21/jre/lib/endorsed
    java.ext.dirs = /usr/java/jdk1.6.0_21/jre/lib/ext:/usr/java/packages/lib/ext
    java.home = /usr/java/jdk1.6.0_21/jre
    java.io.tmpdir = /usr/oracle/Middleware/alsbTempJars
    java.library.path = /usr/java/jdk1.6.0_21/jre/lib/amd64/server:/usr/java/jdk1.6.0_21/jre/lib/amd64:/usr/java/jdk1.6.0_21/jre/../lib/amd64:/usr/oracle/Middleware/patch_wls1035/profiles/default/native:/usr/oracle/Middleware/patch_ocp360/profiles/default/native:/usr/oracle/Middleware/wlserver_10.3/server/native/linux/x86_64:/usr/oracle/Middleware/wlserver_10.3/server/native/linux/x86_64/oci920_8:/usr/java/packages/lib/amd64:/usr/lib64:/lib64:/lib:/usr/lib
    java.naming.factory.initial = weblogic.jndi.WLInitialContextFactory
    java.naming.factory.url.pkgs = weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url
    java.protocol.handler.pkgs = oracle.mds.net.protocol|weblogic.net
    java.runtime.name = Java(TM) SE Runtime Environment
    java.runtime.version = 1.6.0_21-b07
    java.security.policy = /usr/oracle/Middleware/wlserver_10.3/server/lib/weblogic.policy
    java.specification.name = Java Platform API Specification
    java.specification.vendor = Sun Microsystems Inc.
    java.specification.version = 1.6
    java.vendor = Sun Microsystems Inc.
    java.vendor.url = http://java.sun.com/
    java.vendor.url.bug = http://java.sun.com/cgi-bin/bugreport.cgi
    java.version = 1.6.0_21
    java.vm.info = mixed mode
    java.vm.name = Java HotSpot(TM) 64-Bit Server VM
    java.vm.specification.name = Java Virtual Machine Specification
    java.vm.specification.vendor = Sun Microsystems Inc.
    java.vm.specification.version = 1.0
    java.vm.vendor = Sun Microsystems Inc.
    java.vm.version = 17.0-b17
    javax.management.builder.initial = weblogic.management.jmx.mbeanserver.WLSMBeanServerBuilder
    javax.net.debug = all
    javax.rmi.CORBA.PortableRemoteObjectClass = weblogic.iiop.PortableRemoteObjectDelegateImpl
    javax.rmi.CORBA.UtilClass = weblogic.iiop.UtilDelegateImpl
    javax.xml.rpc.ServiceFactory = weblogic.webservice.core.rpc.ServiceFactoryImpl
    javax.xml.soap.MessageFactory = weblogic.webservice.core.soap.MessageFactoryImpl
    jrf.version = 11.1.1
    jrockit.optfile = /usr/oracle/Middleware/oracle_common/modules/oracle.jrf_11.1.1/jrocket_optfile.txt
    oracle.core.ojdl.logging.applicationcontextprovider = oracle.core.ojdl.logging.WlsApplicationContextImpl
    oracle.core.ojdl.logging.componentId = osb_server1
    oracle.core.ojdl.logging.usercontextprovider = oracle.core.ojdl.logging.WlsUserContextImpl
    oracle.deployed.app.dir = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/servers/osb_server1/tmp/_WL_user
    oracle.deployed.app.ext = /-
    oracle.domain.config.dir = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/fmwconfig
    oracle.security.jps.config = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/fmwconfig/jps-config.xml
    oracle.server.config.dir = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/config/fmwconfig/servers/osb_server1
    org.apache.commons.logging.Log = org.apache.commons.logging.impl.Jdk14Logger
    org.omg.CORBA.ORBClass = weblogic.corba.orb.ORB
    org.omg.CORBA.ORBSingletonClass = weblogic.corba.orb.ORB
    org.xml.sax.driver = weblogic.xml.jaxp.RegistryXMLReader
    org.xml.sax.parser = weblogic.xml.jaxp.RegistryParser
    os.arch = amd64
    os.name = Linux
    os.version = 2.6.18-238.9.1.el5
    path.separator = :
    platform.home = /usr/oracle/Middleware/wlserver_10.3
    ssl.debug = true
    sun.arch.data.model = 64
    sun.boot.class.path = /usr/java/jdk1.6.0_21/jre/lib/resources.jar:/usr/java/jdk1.6.0_21/jre/lib/rt.jar:/usr/java/jdk1.6.0_21/jre/lib/sunrsasign.jar:/usr/java/jdk1.6.0_21/jre/lib/jsse.jar:/usr/java/jdk1.6.0_21/jre/lib/jce.jar:/usr/java/jdk1.6.0_21/jre/lib/charsets.jar:/usr/java/jdk1.6.0_21/jre/classes
    sun.boot.library.path = /usr/java/jdk1.6.0_21/jre/lib/amd64
    sun.cpu.endian = little
    sun.io.unicode.encoding = UnicodeLittle
    sun.java.launcher = SUN_STANDARD
    sun.jnu.encoding = UTF-8
    sun.management.compiler = HotSpot 64-Bit Server Compiler
    sun.os.patch.level = unknown
    sun.security.ssl.allowUnsafeRenegotiation = true
    user.country = ES
    user.dir = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain
    user.home = /home/weblogic
    user.language = es
    user.name = weblogic
    user.timezone = Europe/Madrid
    vde.home = /usr/oracle/Middleware/user_projects/domains/cehe_osb_domain/servers/osb_server1/data/ldap
    weblogic.Name = osb_server1
    weblogic.ProductionModeEnabled = true
    weblogic.alternateTypesDirectory = /usr/oracle/Middleware/oracle_common/modules/oracle.ossoiap_11.1.1,/usr/oracle/Middleware/oracle_common/modules/oracle.oamprovider_11.1.1
    weblogic.classloader.preprocessor = weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor
    weblogic.debug.DebugSecuritySSL = true
    weblogic.ext.dirs = /usr/oracle/Middleware/patch_wls1035/profiles/default/sysext_manifest_classpath:/usr/oracle/Middleware/patch_ocp360/profiles/default/sysext_manifest_classpath
    weblogic.home = /usr/oracle/Middleware/wlserver_10.3/server
    weblogic.jdbc.remoteEnabled = false
    weblogic.management.discover = false
    weblogic.management.server = http://xxx.xxx.xxx.xxx:x001
    weblogic.security.SSL.ignoreHostnameVerification = true
    weblogic.security.SSL.trustedCAKeyStore = /usr/oracle/Middleware/wlserver_10.3/server/lib/cacerts
    wls.home = /usr/oracle/Middleware/wlserver_10.3/server
    wlw.iterativeDev = false
    wlw.logErrorsToConsole = false
    wlw.testConsole = false
    >
    And my startweblogic.sh is
    ${JAVA_HOME}/bin/java ${JAVA_VM} ${MEM_ARGS} -Dweblogic.Name=${SERVER_NAME} -Dssl.debug=true -Djavax.net.debug=all -Dsun.security.ssl.allowUnsafeRenegotiation=true -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.SSL.trustedCAKeyStore="/usr/oracle/Middleware/wlserver_10.3/server/lib/cacerts"  -Djava.security.policy=${WL_HOME}/server/lib/weblogic.policy ${JAVA_OPTIONS} ${PROXY_SETTINGS} ${SERVER_CLASS}
    The logs say...
    ####<30-sep-2013 22H39' CEST> <Info> <OSB Kernel> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579346> <BEA-398202> <
    [Rastreo de OSB] Se ha enviado una petición saliente.
    Service Ref = XXXXXXX/Business/xxxxxx
    URI = https://xxxx.xxx.xxx.xxx:8443/axis/services/xxxx
    Request metadata =
        <xml-fragment>
          <tran:headers xsi:type="http:HttpRequestHeaders" xmlns:http="http://www.bea.com/wli/sb/transports/http" xmlns:tran="http://www.bea.com/wli/sb/transports" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
            <http:Content-Type>text/xml; charset=utf-8</http:Content-Type>
            <http:SOAPAction>""</http:SOAPAction>
          </tran:headers>
          <tran:encoding xmlns:tran="http://www.bea.com/wli/sb/transports">utf-8</tran:encoding>
          <http:query-parameters xmlns:http="http://www.bea.com/wli/sb/transports/http"/>
        </xml-fragment>
    Payload =
    <?xml version="1.0" encoding="UTF-8"?>
    <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soap:Header xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
    </soap:Header><soapenv:Body><urn:listarEntidades xmlns:urn="urn:PagoWS"><modelo xsi:type="xs:string" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">600</modelo><concepto xsi:type="xs:string" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">0001</concepto></urn:listarEntidades></soapenv:Body></soapenv:Envelope>
    >
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579376> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set protocolVersion to 3.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579379> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLTruster to weblogic.security.utils.SSLTrustValidator@5cc65c7a.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579381> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLHostnameVerifier to weblogic.security.utils.SSLWLSHostnameVerifier@359d9606.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579384> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enforceConstraints level to 1.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579384> <BEA-000000> <SSLSetup: loading trusted CA certificates>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579390> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set protocolVersion to 3.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579390> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLTruster to weblogic.security.utils.SSLTrustValidator@3ad1a015.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579390> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLHostnameVerifier to weblogic.security.utils.SSLWLSHostnameVerifier@6e71b55.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579390> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enforceConstraints level to 1.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579391> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enableUnencryptedNullCipher to false.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579391> <BEA-000000> <SSLContextManager: loading server SSL identity>
    ####<30-sep-2013 22H39' CEST> <Notice> <Security> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579393> <BEA-090171> <Loading the identity certificate and private key stored under the alias DemoIdentity from the jks keystore file /usr/oracle/Middleware/wlserver_10.3/server/lib/DemoIdentity.jks.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579420> <BEA-000000> <Loaded public identity certificate chain:>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579420> <BEA-000000> <Subject: CN=osb01.ha.gva.es, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US; Issuer: CN=CertGenCAB, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573579422> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: doKeysMatch called.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581348> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: addIdentity called.>
    ####<30-sep-2013 22H39' CEST> <Notice> <Security> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581350> <BEA-090169> <Loading trusted certificates from the jks keystore file /usr/oracle/Middleware/wlserver_10.3/server/lib/DemoTrust.jks.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581358> <BEA-000000> <SSLContextManager: loaded 14 trusted CAs from /usr/oracle/Middleware/wlserver_10.3/server/lib/DemoTrust.jks>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581358> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA3; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581359> <BEA-000000> <Subject: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES; Issuer: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581359> <BEA-000000> <Subject: CN=CACERT, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US; Issuer: CN=CACERT, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581359> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA2; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581360> <BEA-000000> <Subject: [email protected], CN=Demo Certificate Authority Constraints, OU=Security, O=BEA WebLogic, L=San Francisco, ST=California, C=US; Issuer: [email protected], CN=Demo Certificate Authority Constraints, OU=Security, O=BEA WebLogic, L=San Francisco, ST=California, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581360> <BEA-000000> <Subject: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581360> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA1; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581361> <BEA-000000> <Subject: [email protected], CN=Demo Certificate Authority Constraints, OU=Security, O=BEA WebLogic, L=San Francisco, ST=California, C=US; Issuer: [email protected], CN=Demo Certificate Authority Constraints, OU=Security, O=BEA WebLogic, L=San Francisco, ST=California, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581361> <BEA-000000> <Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVCA-110; Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581361> <BEA-000000> <Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1; Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581361> <BEA-000000> <Subject: CN=CertGenCAB, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US; Issuer: CN=CertGenCAB, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581362> <BEA-000000> <Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVCA-120; Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581362> <BEA-000000> <Subject: CN=e-notario.notariado.org, SERIALNUMBER=Q2863008E, OU=Certificado Notarial de Servidor Seguro, OU=Autorizado ante Notario, O=CONSEJO GENERAL DEL NOTARIADO, C=ES; Issuer: CN=ANCERT Certificados Notariales de Sistemas V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, L=Paseo del General Martinez Campos 46 6a planta 28010 Madrid, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581362> <BEA-000000> <Subject: CN=ANCERT Certificados Notariales de Sistemas V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, L=Paseo del General Martinez Campos 46 6a planta 28010 Madrid, C=ES; Issuer: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES>
    ####<30-sep-2013 22H39' CEST> <Notice> <Security> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581363> <BEA-090169> <Loading trusted certificates from the jks keystore file /usr/java/jdk1.6.0_21/jre/lib/security/cacerts.>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581471> <BEA-000000> <SSLContextManager: loaded 91 trusted CAs from /usr/java/jdk1.6.0_21/jre/lib/security/cacerts>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581472> <BEA-000000> <Subject: CN=ANCERT Certificados Notariales de Sistemas V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, L=Paseo del General Martinez Campos 46 6a planta 28010 Madrid, C=ES; Issuer: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581472> <BEA-000000> <Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US; Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581472> <BEA-000000> <Subject: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter GmbH, C=DE; Issuer: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter GmbH, C=DE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581473> <BEA-000000> <Subject: [email protected], CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA; Issuer: [email protected], CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581473> <BEA-000000> <Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH; Issuer: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581473> <BEA-000000> <Subject: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH; Issuer: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581474> <BEA-000000> <Subject: [email protected], CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA; Issuer: [email protected], CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581474> <BEA-000000> <Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US; Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581474> <BEA-000000> <Subject: CN=e-notario.notariado.org, SERIALNUMBER=Q2863008E, OU=Certificado Notarial de Servidor Seguro, OU=Autorizado ante Notario, O=CONSEJO GENERAL DEL NOTARIADO, C=ES; Issuer: CN=ANCERT Certificados Notariales de Sistemas V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, L=Paseo del General Martinez Campos 46 6a planta 28010 Madrid, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581474> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA2; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581474> <BEA-000000> <Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVCA-120; Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581475> <BEA-000000> <Subject: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US; Issuer: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581475> <BEA-000000> <Subject: [email protected], CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA; Issuer: [email protected], CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581475> <BEA-000000> <Subject: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US; Issuer: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581476> <BEA-000000> <Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US; Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581476> <BEA-000000> <Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL; Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581476> <BEA-000000> <Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE; Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581477> <BEA-000000> <Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1; Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581477> <BEA-000000> <Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US; Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581477> <BEA-000000> <Subject: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM; Issuer: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581477> <BEA-000000> <Subject: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM; Issuer: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581478> <BEA-000000> <Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US; Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581478> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA1; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581478> <BEA-000000> <Subject: [email protected], CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network; Issuer: [email protected], CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581478> <BEA-000000> <Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US; Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581479> <BEA-000000> <Subject: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US; Issuer: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581479> <BEA-000000> <Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US; Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581479> <BEA-000000> <Subject: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US; Issuer: CN=thawte Primary Root CA - G3, OU="(c) 2008 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581479> <BEA-000000> <Subject: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES; Issuer: CN=ANCERT Certificados Notariales V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581480> <BEA-000000> <Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE; Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581480> <BEA-000000> <Subject: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US; Issuer: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581480> <BEA-000000> <Subject: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581480> <BEA-000000> <Subject: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US; Issuer: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581481> <BEA-000000> <Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE; Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581481> <BEA-000000> <Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US; Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581481> <BEA-000000> <Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE; Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581481> <BEA-000000> <Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US; Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581482> <BEA-000000> <Subject: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=ACCV-CA2; Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581482> <BEA-000000> <Subject: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU; Issuer: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581482> <BEA-000000> <Subject: CN=e-notario.notariado.org, SERIALNUMBER=Q2863008E, OU=Certificado Notarial de Servidor Seguro, OU=Autorizado ante Notario, O=CONSEJO GENERAL DEL NOTARIADO, C=ES; Issuer: CN=ANCERT Certificados Notariales de Sistemas V2, O=Agencia Notarial de Certificacion S.L.U. - CIF B83395988, L=Paseo del General Martinez Campos 46 6a planta 28010 Madrid, C=ES>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581482> <BEA-000000> <Subject: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE; Issuer: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581483> <BEA-000000> <Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US; Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581483> <BEA-000000> <Subject: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE; Issuer: CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581483> <BEA-000000> <Subject: CN=TC TrustCenter Universal CA I, OU=TC TrustCenter Universal CA, O=TC TrustCenter GmbH, C=DE; Issuer: CN=TC TrustCenter Universal CA I, OU=TC TrustCenter Universal CA, O=TC TrustCenter GmbH, C=DE>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581484> <BEA-000000> <Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US; Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581484> <BEA-000000> <Subject: CN=Class 3P Primary CA, O=Certplus, C=FR; Issuer: CN=Class 3P Primary CA, O=Certplus, C=FR>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581484> <BEA-000000> <Subject: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL; Issuer: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581485> <BEA-000000> <Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US; Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581485> <BEA-000000> <Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3; Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581485> <BEA-000000> <Subject: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US; Issuer: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581486> <BEA-000000> <Subject: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP; Issuer: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581486> <BEA-000000> <Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US; Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:-713aee67:14170915b52:-8000-0000000000000386> <1380573581486> <BEA-000000> <Subject: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP; Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP>
    ####<30-sep-2013 22H39' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '5' for queue: 'weblogic.kernel.Default (self-tuning)'> &

    hellow and thanks...
    but I have wrote this new option at the script...
    ${JAVA_HOME}/bin/java ${JAVA_VM} ${MEM_ARGS} -Dweblogic.Name=${SERVER_NAME} -Dweblogic.security.SSL.enable.renegotiation=true -Dssl.debug=true -Djavax.net.debug=all -Dsun.security.ssl.allowUnsafeRenegotiation=true  -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.SSL.trustedCAKeyStore="/usr/oracle/Middleware/wlserver_10.3/server/lib/cacerts" -Djava.security.policy=${WL_HOME}/server/lib/weblogic.policy ${JAVA_OPTIONS} ${PROXY_SETTINGS} ${SERVER_CLASS}  >"${WLS_REDIRECT_LOG}" 2>&1
    and the result is the same....
    bytesConsumed = 603 bytesProduced = 624.>
    ####<05-oct-2013 17H45' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:4fa71423:141893c76fd:-8000-000000000000039f> <1380987905019> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 8 bytesProduced = 29.>
    ####<05-oct-2013 17H45' CEST> <Debug> <SecuritySSL> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <bebbc752e6129bda:4fa71423:141893c76fd:-8000-000000000000039f> <1380987905021> <BEA-000000> <SSLIOContextTable.findContext(sock): 467714884>
    ####<05-oct-2013 17H45' CEST> <Info> <OSB Kernel> <osb01.ha.gva.es> <osb_server1> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <bebbc752e6129bda:4fa71423:141893c76fd:-8000-000000000000039f> <1380987905022> <BEA-398205> <
    [Rastreo de OSB] La petición saliente ha causado una excepción
    Service Ref = XXX/Bussines/XXXX
    URI = https://xxxx.cap.gva.es:8443/axis/services/Pago
    Error Message = java.lang.NullPointerException
    Payload =
    >

  • Getting following exception on TCP ssl at server side

    Hi,
    I am trying to setup an ssl client and ssl server.
    But on ssl client side, My need_wrap going into loop(Buffer overflow)
    On my server side, i am getting following error.
    Please help me...I am not getting much discussion/articles to solve this problem.
    javax.net.ssl.SSLProtocolException: Handshake message sequence violation, state = 1, type = 1
    javax.net.ssl.SSLProtocolException: Handshake message sequence violation, state = 1, type = 1
      at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1371)
      at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
      at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:790)
      at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:758)
      at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
      at com.ipay.ssl.SSLServerNio.doHandshake(SSLServerNio.java:55)
      at com.ipay.ssl.SSLServerNio.main(SSLServerNio.java:215)
    Caused by: javax.net.ssl.SSLProtocolException: Handshake message sequence violation, state = 1, type = 1
      at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:156)
      at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
      at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
      at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
      at java.security.AccessController.doPrivileged(Native Method)
      at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
      at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
      at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
      at java.lang.Thread.run(Thread.java:744)
    My server handshake code look like this.
    void doHandshake(SocketChannel socketChannel, SSLEngine engine,
             ByteBuffer myNetSendData, ByteBuffer myNetRecieveData) throws Exception {
         // Create byte buffers to use for holding application data
      ByteBuffer myAppDataSend = ByteBuffer.allocate(engine.getSession().getApplicationBufferSize());
      ByteBuffer myAppDataRecieve = ByteBuffer.allocate(engine.getSession().getApplicationBufferSize());
      System.out.println(engine.getPeerPort());
         // Begin handshake
         engine.beginHandshake();
         SSLEngineResult.HandshakeStatus hs = engine.getHandshakeStatus();
         // Process handshaking message
         while (hs != SSLEngineResult.HandshakeStatus.FINISHED &&
             hs != SSLEngineResult.HandshakeStatus.NOT_HANDSHAKING) {
          switch (hs) {
             case NEED_UNWRAP:
              System.out.println("Reached NEED UNWRAP");
                 // Receive handshaking data from peer
                 if (socketChannel.read(myNetRecieveData) < 0) {
                     // Handle closed channel
                  System.out.println("not able toRead data from channel to buffer at client");
                 myNetRecieveData.flip();
                 // Process incoming handshaking data
                 SSLEngineResult res = engine.unwrap(myNetRecieveData, myAppDataRecieve);
               //  myNetRecieveData.compact();
                 // Getting handshake status
                 hs = res.getHandshakeStatus();
                 System.out.println("Debugging in NEED_UNWRAP-->"+hs);
                 // Check status
                 switch (res.getStatus()) {
                 case OK :
                     // Handle OK status
                  System.out.println("OK");
                     break;
                 case BUFFER_OVERFLOW:
                  System.out.println("BUFFER OVERFLOW");
                  break;
                 case BUFFER_UNDERFLOW:
                  System.out.println("BUFFER UNDERFLOW");
                  /* if (socketChannel.read(myNetRecieveData) < 0) {
                     // Handle closed channel
                  System.out.println("not able toRead data from channel to buffer at client");
                  hs=HandshakeStatus.NEED_UNWRAP;
                  System.out.println("Read data on underflow condition");
                  break;
                 case CLOSED:
                  System.out.println("CLOSED");
                  break;
                 // Handle other status: BUFFER_UNDERFLOW, BUFFER_OVERFLOW, CLOSED
                 break;
             case NEED_WRAP :
              System.out.println("Reached NEED WRAP");
                 // Empty the local network packet buffer.
                 // Generate handshaking data
              //myAppDataSend.flip();
                 res = engine.wrap(myAppDataSend, myNetSendData);
                 // Getting handshake status
                 hs = res.getHandshakeStatus();
                 System.out.println("Debugging in NEED_WRAP-->"+hs);
                 // Check status
                 switch (res.getStatus()) {
                 case OK :
                  System.out.println("OK");
                     myNetSendData.flip();
                     // Send the handshaking data to peer
                     while (myNetSendData.hasRemaining()) {
                         if (socketChannel.write(myNetSendData) < 0) {
                             // closing socket channel
                     break;
                 case BUFFER_OVERFLOW:
                  System.out.println("BUFFER OVERFLOW");
                  //Writing network send buffer
                  myNetSendData.flip();
                     while (myNetSendData.hasRemaining()) {
                  if(socketChannel.write(myNetSendData) < 0)
                  System.out.println("Some thing wrong happened");
                  System.out.println("written data");
                  hs=HandshakeStatus.NEED_WRAP;
                  break;
                 case BUFFER_UNDERFLOW:
                  System.out.println("BUFFER UNDERFLOW");
                  break;
                 case CLOSED:
                  System.out.println("CLOSED");
                  break;
                 // Handle other status:  BUFFER_OVERFLOW, BUFFER_UNDERFLOW, CLOSED
                  break;
             case NEED_TASK :
              System.out.println("NEED TASK");
              System.out.println("Debugging in NEED_TASK-->"+hs);
              Runnable task;
              while((task=engine.getDelegatedTask()) != null)
              System.out.println("Inside while loop");
              ExecutorService executorService = Executors.newFixedThreadPool(1);
              executorService.execute(task);
                 // Handle blocking tasks
              hs=engine.getHandshakeStatus();
              System.out.println("Printing"+engine.getHandshakeStatus());
              break;
             case FINISHED:
              System.out.println("Debugging in FINISHED-->"+hs);
              System.out.println("handshake done");
              hs=HandshakeStatus.FINISHED;
                    break;
             // Handle other status:  // FINISHED or NOT_HANDSHAKING
         // Processes after handshaking
    brs,
    varghese

    Hi Zia,
    The error is...
    Caused by: java.io.InvalidClassException: org.eclipse.persistence.indirection.IndirectList; local class incompatible: stream classdesc serialVersionUID = 4038061360325736360, local class serialVersionUID = -494763524358427112
    ...which means you have two different versions of org.eclipse.persistence.indirection.IndirectList, one on the server and one in the client (JDeveloper). As these classes have different serialVersionUID values then Java throws an exception when deserializing as they are probably not compatible.
    I don't know much about the Eclipse stuff but from looking at your post I can only assume one version of the class is in D:\Coherence\toplink\jlib\eclipselink.jar on the Coherence server side and the other is in JDevloper in D:\OracleSOA\Middleware\modules\org.eclipse.persistence_1.1.0.0_2-1.jar as these are the only jar file containing "eclipse" that I can see on the classpaths.
    JK

  • OSB throwing "BEA-380000 Unauthorized" error when calling https

    Hello All,
    I am invoking webservice using OSB service and I am getting "BEA-380000 Unauthorized" error. The webservice is HTTPS .
    I enabled the weblogic SSL trace and it looks like SSL Handshake is successful.
    >>self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: Successfully completed post-handshake processing.>
    After the handshake I am getting "BEA-380000 Unauthorized" error.
    Can anyone help me to investigate the issue?
    The osb log file is below-------
    ####<Jun 19, 2013 3:24:24 PM CEST> <Info> <ALSB Logging> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264053> <BEA-000000> < [Soap Access, Soap Access_request, RequestLogging, REQUEST] PS_Generic_Soap_Adapter: Cablecom_ERP_SAP_CH_IOM503_124 Publishing to https://172.25.110.22:8043/sap/bc/srt/rfc/sap/z_ws_bsa_release_porder/300/z_ws_bsa_release_porder/z_ws_bsa_release_porder>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264065> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLTruster to weblogic.security.utils.SSLTrustValidator@2dde6717.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264065> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLHostnameVerifier to weblogic.security.utils.SSLWLSHostnameVerifier@34fcd47d.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264065> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enforceConstraints level to 1.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264066> <BEA-000000> <SSLSetup: loading trusted CA certificates>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264066> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: addTrustedCA called.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264093> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Got SSLContext, protocol=TLS, provider=SunJSSE>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264095> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledCipherSuites(String[]): value=TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_RC4_128_MD5,TLS_EMPTY_RENEGOTIATION_INFO_SCSV.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264095> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledProtocols(String[]): value=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264095> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnableSessionCreation(boolean): value=true.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264096> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264096> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setWantClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264096> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264096> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264097> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264097> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264099> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 145.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264099> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264124> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 86 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264124> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 636 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264125> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 9 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264128> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_WRAP
    bytesConsumed = 0 bytesProduced = 139.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264128> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_WRAP
    bytesConsumed = 0 bytesProduced = 6.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264128> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 53.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264128> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264161> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 6 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264166> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = FINISHED
    bytesConsumed = 53 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264166> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: negotiatedCipherSuite: TLS_RSA_WITH_AES_128_CBC_SHA>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264167> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.getNeedClientAuth(): false>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264167> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: Peer certificate chain: [Ljava.security.cert.X509Certificate;@6ee4f34f>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264167> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: weblogic.security.utils.SSLTrustValidator.isPeerCertsRequired(): false>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264167> <BEA-000000> <validationCallback: validateErr = 0>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264169> <BEA-000000> <  cert[0] = [
      Version: V1
      Subject: CN=tsrSAPSBX01.intern.upc.ch, OU=I0020139603, OU=SAP Web AS, O=SAP Trust Community, C=DE
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 1024 bits
      modulus: 179292036806620485918804919711928433244499815376568440587757413977992676729610723730712440151809520696043454811364142601367366025197824567437784372913655033390588836330766272601255260587177867263131005893781653504646623313565571707826556608307076192089536895471870912147173852420103041926818453926934928317821
      public exponent: 65537
      Validity: [From: Wed Jan 30 16:28:10 CET 2013,
                   To: Fri Jan 01 01:00:01 CET 2038]
      Issuer: CN=tsrSAPSBX01.intern.upc.ch, OU=I0020139603, OU=SAP Web AS, O=SAP Trust Community, C=DE
      SerialNumber: [    20130130 152810]
      Algorithm: [SHA1withRSA]
      Signature:
    0000: 04 E4 90 AF E9 C2 01 39   23 A0 61 7E 60 E8 C5 84  .......9#.a.`...
    0010: BB DE AE 81 09 FA 19 5A   63 E2 82 6B C9 C7 E0 E1  .......Zc..k....
    0020: 45 B3 6D BA EB CD A9 EC   33 B8 32 4F EC 4B BF CB  E.m.....3.2O.K..
    0030: 88 90 A3 C2 99 10 38 D4   DB C9 18 8C 73 18 E2 6E  ......8.....s..n
    0040: 8B B3 C6 8C 88 A3 71 EA   43 69 48 52 C0 11 5C 04  ......q.CiHR..\.
    0050: 1A 30 28 8F D4 E5 4B 15   50 13 AF DA 2F 74 4D BF  .0(...K.P.../tM.
    0060: A7 29 1C DD 08 AB 3D 51   04 B9 5F A6 C7 82 BB BB  .)....=Q.._.....
    0070: 62 90 B8 D7 B6 9E AA A4   B5 DE C5 A0 06 ED EB 5A  b..............Z
    ]>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264170> <BEA-000000> <weblogic user specified trustmanager validation status 0>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264171> <BEA-000000> <SSLTrustValidator returns: 0>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264171> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: No trust failure, validateErr=0.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264180> <BEA-000000> <Performing hostname validation checks: tsrsapsbx01.cioio.net>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264180> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: Successfully completed post-handshake processing.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264181> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 309 bytesProduced = 341.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264182> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 722 bytesProduced = 794.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:-4658cba0:13f5c4d8530:-8000-00000000000005c0> <1371648264182> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '3' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 8 bytesProduced = 74.>
    ####<Jun 19, 2013 3:24:24 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648264213> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 2405 bytesProduced = 2379.>
    ####<Jun 19, 2013 3:24:26 PM CEST> <Info> <Common> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029fb> <1371648266984> <BEA-000628> <Created "1" resources for pool "upc.jdbc.pe.erp.eBusiness11Datasource", out of which "0" are available and "1" are unavailable.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269215> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLTruster to weblogic.security.utils.SSLTrustValidator@5a92606e.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269215> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLHostnameVerifier to weblogic.security.utils.SSLWLSHostnameVerifier@75839609.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269216> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enforceConstraints level to 1.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269216> <BEA-000000> <SSLSetup: loading trusted CA certificates>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269216> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: addTrustedCA called.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269242> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Got SSLContext, protocol=TLS, provider=SunJSSE>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269244> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledCipherSuites(String[]): value=TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_RC4_128_MD5,TLS_EMPTY_RENEGOTIATION_INFO_SCSV.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269245> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledProtocols(String[]): value=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269245> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnableSessionCreation(boolean): value=true.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269245> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269245> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setWantClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269246> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269246> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269246> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269246> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269248> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 145.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269248> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269273> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 86 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269274> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 636 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269275> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 9 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269278> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_WRAP
    bytesConsumed = 0 bytesProduced = 139.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269278> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_WRAP
    bytesConsumed = 0 bytesProduced = 6.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269279> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 53.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269279> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269311> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 6 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269312> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = FINISHED
    bytesConsumed = 53 bytesProduced = 0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269312> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: negotiatedCipherSuite: TLS_RSA_WITH_AES_128_CBC_SHA>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269312> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.getNeedClientAuth(): false>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269317> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: Peer certificate chain: [Ljava.security.cert.X509Certificate;@63c2f31c>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269317> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: weblogic.security.utils.SSLTrustValidator.isPeerCertsRequired(): false>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269317> <BEA-000000> <validationCallback: validateErr = 0>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269319> <BEA-000000> <  cert[0] = [
      Version: V1
      Subject: CN=tsrSAPSBX01.intern.upc.ch, OU=I0020139603, OU=SAP Web AS, O=SAP Trust Community, C=DE
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 1024 bits
      modulus: 179292036806620485918804919711928433244499815376568440587757413977992676729610723730712440151809520696043454811364142601367366025197824567437784372913655033390588836330766272601255260587177867263131005893781653504646623313565571707826556608307076192089536895471870912147173852420103041926818453926934928317821
      public exponent: 65537
      Validity: [From: Wed Jan 30 16:28:10 CET 2013,
                   To: Fri Jan 01 01:00:01 CET 2038]
      Issuer: CN=tsrSAPSBX01.intern.upc.ch, OU=I0020139603, OU=SAP Web AS, O=SAP Trust Community, C=DE
      SerialNumber: [    20130130 152810]
      Algorithm: [SHA1withRSA]
      Signature:
    0000: 04 E4 90 AF E9 C2 01 39   23 A0 61 7E 60 E8 C5 84  .......9#.a.`...
    0010: BB DE AE 81 09 FA 19 5A   63 E2 82 6B C9 C7 E0 E1  .......Zc..k....
    0020: 45 B3 6D BA EB CD A9 EC   33 B8 32 4F EC 4B BF CB  E.m.....3.2O.K..
    0030: 88 90 A3 C2 99 10 38 D4   DB C9 18 8C 73 18 E2 6E  ......8.....s..n
    0040: 8B B3 C6 8C 88 A3 71 EA   43 69 48 52 C0 11 5C 04  ......q.CiHR..\.
    0050: 1A 30 28 8F D4 E5 4B 15   50 13 AF DA 2F 74 4D BF  .0(...K.P.../tM.
    0060: A7 29 1C DD 08 AB 3D 51   04 B9 5F A6 C7 82 BB BB  .)....=Q.._.....
    0070: 62 90 B8 D7 B6 9E AA A4   B5 DE C5 A0 06 ED EB 5A  b..............Z
    ]>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269321> <BEA-000000> <weblogic user specified trustmanager validation status 0>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269322> <BEA-000000> <SSLTrustValidator returns: 0>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269322> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: No trust failure, validateErr=0.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269326> <BEA-000000> <Performing hostname validation checks: tsrsapsbx01.cioio.net>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269326> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: Successfully completed post-handshake processing.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269327> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 309 bytesProduced = 341.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269329> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 722 bytesProduced = 794.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-00000000000029a2> <1371648269329> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '4' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 8 bytesProduced = 74.>
    ####<Jun 19, 2013 3:24:29 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648269359> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 2405 bytesProduced = 2379.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274361> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLTruster to weblogic.security.utils.SSLTrustValidator@5435a197.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274362> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set weblogic.security.utils.SSLHostnameVerifier to weblogic.security.utils.SSLWLSHostnameVerifier@7c66f9ca.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274362> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Set enforceConstraints level to 1.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274362> <BEA-000000> <SSLSetup: loading trusted CA certificates>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274362> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: addTrustedCA called.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274389> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLCONTEXT: Got SSLContext, protocol=TLS, provider=SunJSSE>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274397> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledCipherSuites(String[]): value=TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_RC4_128_MD5,TLS_EMPTY_RENEGOTIATION_INFO_SCSV.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274397> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnabledProtocols(String[]): value=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274397> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setEnableSessionCreation(boolean): value=true.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274398> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274398> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setWantClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274398> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274398> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setNeedClientAuth(boolean): value=false.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274398> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274399> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientMode(boolean): value=true.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60efbc9f1d51:7343109:13f5c952092:-8000-0000000000002a82> <1371648274400> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = OK HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 145.>
    ####<Jun 19, 2013 3:24:34 PM CEST> <Debug> <SecuritySSL> <viedfuspe55> <OSBNode1> <[ACTIVE] ExecuteThread: '9' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <83ab60

    The error which you are getting is not related to SSL. Target service might be imposing basic authentication.
    To implement basic authentication you need to follow below steps in OSB -
    1. Create a service account with username and password (owner of target service must provide this info)
    2. In HTTP Transport Configuration of your business service, select "Basic" in "Authentication" setting and browse the service account you created in "Service Account" setting at same page
    3. Save and activate the configuration
    4. Test the business service using OSB test console
    You should get in touch with target service admin to understand which kind of authentication is required (if not basic) and where your request is failing exactly.
    Regards,
    Anuj

  • Non-blocking SSLEngine example

    Since the example of using SSLEngine with non-blocking IO that comes with Java is quite limited, I have decided to release my own for anyone who wants to see how I solved the various problems that you must face. The example is designed to be a generic non-blocking server that supports SSL.
    This is only meant to be an example, as I wrote this mostly in order to learn how to use the SSLEngine, and therefore has certain limitations, and is not thouroughly tested.
    You can download the file at: http://members.aol.com/ben77/nio_server2.tar.gz
    Here is also the code for SecureIO, which is roughly analagous to the Java example's ChannelIOSecure:
    package nio_server2.internalio;
    import java.io.IOException;
    import java.nio.ByteBuffer;
    import java.nio.channels.*;
    import java.util.concurrent.*;
    import javax.net.ssl.*;
    import static javax.net.ssl.SSLEngineResult.HandshakeStatus.*;
    * Does IO based on a <code>SocketChannel</code> with all data encrypted using
    * SSL.
    * @author ben
    public class SecureIO extends InsecureIO {
          * SSLTasker is responsible for dealing with all long running tasks required
          * by the SSLEngine
          * @author ben
         private class SSLTasker implements Runnable {
               * @inheritDoc
              public void run() {
                   Runnable r;
                   while ((r = engine.getDelegatedTask()) != null) {
                        r.run();
                   if (inNet.position() > 0) {
                        regnow(); // we may already have read what is needed
                   try {
                        System.out.println(":" + engine.getHandshakeStatus());
                        switch (engine.getHandshakeStatus()) {
                             case NOT_HANDSHAKING:
                                  break;
                             case FINISHED:
                                  System.err.println("Detected FINISHED in tasker");
                                  Thread.dumpStack();
                                  break;
                             case NEED_TASK:
                                  System.err.println("Detected NEED_TASK in tasker");
                                  assert false;
                                  break;
                             case NEED_WRAP:
                                  rereg(SelectionKey.OP_WRITE);
                                  break;
                             case NEED_UNWRAP:
                                  rereg(SelectionKey.OP_READ);
                                  break;
                   } catch (IOException e) {
                        e.printStackTrace();
                        try {
                             shutdown();
                        } catch (IOException ex) {
                             ex.printStackTrace();
                   hsStatus = engine.getHandshakeStatus();
                   isTasking = false;
         private SSLEngine engine;
         private ByteBuffer inNet; // always cleared btwn calls
         private ByteBuffer outNet; // when hasRemaining, has data to write.
         private static final ByteBuffer BLANK = ByteBuffer.allocate(0);
         private boolean initialHandshakeDone = false;
         private volatile boolean isTasking = false;
         private boolean handshaking = true;
         private SSLEngineResult.HandshakeStatus hsStatus = NEED_UNWRAP;
         private boolean shutdownStarted;
         private static Executor executor = getDefaultExecutor();
         private SSLTasker tasker = new SSLTasker();
         private ByteBuffer temp;
          * @return the default <code>Executor</code>
         public static Executor getDefaultExecutor() {
              return new ThreadPoolExecutor(3, Integer.MAX_VALUE, 60L,
                        TimeUnit.SECONDS, new SynchronousQueue<Runnable>(),
                        new DaemonThreadFactory());
         private static class DaemonThreadFactory implements ThreadFactory {
              private static ThreadFactory defaultFactory = Executors
                        .defaultThreadFactory();
               * Creates a thread using the default factory, but sets it to be daemon
               * before returning it
               * @param r
               *            the runnable to run
               * @return the new thread
              public Thread newThread(Runnable r) {
                   Thread t = defaultFactory.newThread(r);
                   t.setDaemon(true);
                   return t;
          * @return the executor currently being used for all long-running tasks
         public static Executor getExecutor() {
              return executor;
          * Changes the executor being used for all long-running tasks. Currently
          * running tasks will still use the old executor
          * @param executor
          *            the new Executor to use
         public static void setExecutor(Executor executor) {
              SecureIO.executor = executor;
          * Creates a new <code>SecureIO</code>
          * @param channel
          *            the channel to do IO on.
          * @param sslCtx
          *            the <code>SSLContext</code> to use
         public SecureIO(SocketChannel channel, SSLContext sslCtx) {
              super(channel);
              engine = sslCtx.createSSLEngine();
              engine.setUseClientMode(false);
              int size = engine.getSession().getPacketBufferSize();
              inNet = ByteBuffer.allocate(size);
              outNet = ByteBuffer.allocate(size);
              outNet.limit(0);
              temp = ByteBuffer.allocate(engine.getSession()
                        .getApplicationBufferSize());
         private void doTasks() throws IOException {
              rereg(0); // don't do anything until the task is done.
              isTasking = true;
              SecureIO.executor.execute(tasker);
          * Does all handshaking required by SSL.
          * @param dst
          *            the destination from an application data read
          * @return true if all needed SSL handshaking is currently complete.
          * @throws IOException
          *             if there are errors in handshaking.
         @Override
         public boolean doHandshake(ByteBuffer dst) throws IOException {
              if (!handshaking) {
                   return true;
              if (dst.remaining() < minBufferSize()) {
                   throw new IllegalArgumentException("Buffer has only "
                             + dst.remaining() + " left + minBufferSize is "
                             + minBufferSize());
              if (outNet.hasRemaining()) {
                   if (!flush()) {
                        return false;
                   switch (hsStatus) {
                        case FINISHED:
                             handshaking = false;
                             initialHandshakeDone = true;
                             rereg(SelectionKey.OP_READ | SelectionKey.OP_WRITE);
                             return true;
                        case NEED_UNWRAP:
                             rereg(SelectionKey.OP_READ);
                             break;
                        case NEED_TASK:
                             doTasks();
                             return false;
                        case NOT_HANDSHAKING:
                             throw new RuntimeException(
                                       "NOT_HANDSHAKING encountered when handshaking");
              SSLEngineResult res;
              System.out.println(hsStatus + "1" + handshaking);
              switch (hsStatus) {
                   case NEED_UNWRAP:
                        int i;
                        do {
                             rereg(SelectionKey.OP_READ);
                             i = super.read(inNet);
                             if (i < 0) {
                                  engine.closeInbound();
                                  handshaking = false;
                                  shutdown();
                                  return true;
                             if (i == 0 && inNet.position() == 0) {
                                  return false;
                             inloop: do {
                                  inNet.flip();
                                  temp.clear();
                                  res = engine.unwrap(inNet, temp);
                                  inNet.compact();
                                  temp.flip();
                                  if (temp.hasRemaining()) {
                                       dst.put(temp);
                                  switch (res.getStatus()) {
                                       case OK:
                                            hsStatus = res.getHandshakeStatus();
                                            if (hsStatus == NEED_TASK) {
                                                 doTasks();
                                            // if (hsStatus == FINISHED) {
                                            // // if (!initialHandshakeDone) {
                                            // // throw new RuntimeException(hsStatus
                                            // // + " encountered when handshaking");
                                            // initialHandshakeDone = true;
                                            // handshaking=false;
                                            // key.interestOps(SelectionKey.OP_READ
                                            // | SelectionKey.OP_WRITE);
                                            // TODO check others?
                                            break;
                                       case BUFFER_UNDERFLOW:
                                            break inloop;
                                       case BUFFER_OVERFLOW:
                                       case CLOSED:
                                            throw new RuntimeException(res.getStatus()
                                                      + " encountered when handshaking");
                             } while (hsStatus == NEED_UNWRAP
                                       && dst.remaining() >= minBufferSize());
                        } while (hsStatus == NEED_UNWRAP
                                  && dst.remaining() >= minBufferSize());
                        if (inNet.position() > 0) {
                             System.err.println(inNet);
                        if (hsStatus != NEED_WRAP) {
                             break;
                        } // else fall through
                        rereg(SelectionKey.OP_WRITE);
                   case NEED_WRAP:
                        do {
                             outNet.clear();
                             res = engine.wrap(BLANK, outNet);
                             switch (res.getStatus()) {
                                  case OK:
                                       outNet.flip();
                                       hsStatus = res.getHandshakeStatus();
                                       if (hsStatus == NEED_TASK) {
                                            doTasks();
                                            return false;
                                       // TODO check others?
                                       break;
                                  case BUFFER_OVERFLOW:
                                       outNet.limit(0);
                                       int size = engine.getSession()
                                                 .getPacketBufferSize();
                                       if (outNet.capacity() < size) {
                                            outNet = ByteBuffer.allocate(size);
                                       } else { // shouldn't happen
                                            throw new RuntimeException(res.getStatus()
                                                      + " encountered when handshaking");
                                  case BUFFER_UNDERFLOW: // engine shouldn't care
                                  case CLOSED:
                                       throw new RuntimeException(res.getStatus()
                                                 + " encountered when handshaking");
                        } while (flush() && hsStatus == NEED_WRAP);
                        break;
                   case NEED_TASK:
                        doTasks();
                        return false;
                   case FINISHED:
                        break; // checked below
                   case NOT_HANDSHAKING:
                        System.err.println(hsStatus + " encountered when handshaking");
                        handshaking = false;
                        initialHandshakeDone = true;
                        rereg(SelectionKey.OP_READ | SelectionKey.OP_WRITE);
              if (hsStatus == FINISHED) {
                   // if (!initialHandshakeDone) {
                   // throw new RuntimeException(hsStatus
                   // + " encountered when handshaking");
                   initialHandshakeDone = true;
                   handshaking = false;
                   rereg(SelectionKey.OP_READ | SelectionKey.OP_WRITE);
              System.out.println(hsStatus + "2" + handshaking);
              return !handshaking;
          * Attempts to flush all buffered data to the channel.
          * @return true if all buffered data has been written.
          * @throws IOException
          *             if there are errors writing the data
         @Override
         public boolean flush() throws IOException {
              if (!outNet.hasRemaining()) {
                   return true;
              super.write(outNet);
              return !outNet.hasRemaining();
          * @return the largest amount of application data that could be read from
          *         the channel at once.
         @Override
         public int minBufferSize() {
              return engine.getSession().getApplicationBufferSize();
          * Begins or proceeds with sending an SSL shutdown message to the client.
          * @return true if all needed IO is complete
          * @throws IOException
          *             if there are errors sending the message.
         @Override
         public boolean shutdown() throws IOException {
              if (!shutdownStarted) {
                   shutdownStarted = true;
                   engine.closeOutbound();
              if (outNet.hasRemaining() && !flush()) {
                   return false;
              SSLEngineResult result;
              do {
                   outNet.clear();
                   result = engine.wrap(BLANK, outNet);
                   if (result.getStatus() != SSLEngineResult.Status.CLOSED) {
                        throw new IOException("Unexpected result in shutdown:"
                                  + result.getStatus());
                   outNet.flip();
                   if (outNet.hasRemaining() && !flush()) {
                        return false;
              } while (result.getHandshakeStatus() == NEED_WRAP);
              return !outNet.hasRemaining();
          * Reads all possible data into the <code>ByteBuffer</code>.
          * @param dst
          *            the buffer to read into.
          * @return the number of bytes read, or -1 if the channel or
          *         <code>SSLEngine</code> is closed
          * @throws IllegalStateException
          *             if the initial handshake isn't complete *
          * @throws IOException
          *             if there are errors.
          * @throws IllegalStateException
          *             if the initial handshake isn't complete
          * @throws IllegalArgumentException
          *             if the remaining space in dst is less than
          *             {@link SecureIO#minBufferSize()}
         @Override
         public int read(ByteBuffer dst) throws IOException {
              if (!initialHandshakeDone) {
                   throw new IllegalStateException("Initial handshake incomplete");
              if (dst.remaining() < minBufferSize()) {
                   throw new IllegalArgumentException("Buffer has only "
                             + dst.remaining() + " left + minBufferSize is "
                             + minBufferSize());
              int sPos = dst.position();
              int i;
              while ((i = super.read(inNet)) != 0
                        && dst.remaining() >= minBufferSize()) {
                   if (i < 0) {
                        engine.closeInbound();
                        shutdown();
                        return -1;
                   do {
                        inNet.flip();
                        temp.clear();
                        SSLEngineResult result = engine.unwrap(inNet, temp);
                        inNet.compact();
                        temp.flip();
                        if (temp.hasRemaining()) {
                             dst.put(temp);
                        switch (result.getStatus()) {
                             case BUFFER_UNDERFLOW:
                                  continue;
                             case BUFFER_OVERFLOW:
                                  throw new Error();
                             case CLOSED:
                                  return -1;
                             // throw new IOException("SSLEngine closed");
                             case OK:
                                  checkHandshake();
                                  break;
                   } while (inNet.position() > 0);
              return dst.position() - sPos;
          * Encrypts data and writes it to the channel.
          * @param src
          *            the data to write
          * @return the number of bytes written
          * @throws IOException
          *             if there are errors.
          * @throws IllegalStateException
          *             if the initial handshake isn't complete
         @Override
         public int write(ByteBuffer src) throws IOException {
              if (!initialHandshakeDone) {
                   throw new IllegalStateException("Initial handshake incomplete");
              if (!flush()) {
                   return 0;
              int written = 0;
              outer: while (src.hasRemaining()) {
                   outNet.clear(); // we flushed it
                   SSLEngineResult result = engine.wrap(src, outNet);
                   outNet.flip();
                   switch (result.getStatus()) {
                        case BUFFER_UNDERFLOW:
                             break outer; // not enough left to send (prob won't
                        // happen - padding)
                        case BUFFER_OVERFLOW:
                             if (!flush()) {
                                  break outer; // can't remake while still have
                                  // stuff to write
                             int size = engine.getSession().getPacketBufferSize();
                             if (outNet.capacity() < size) {
                                  outNet = ByteBuffer.allocate(size);
                             } else { // shouldn't happen
                                  throw new RuntimeException(hsStatus
                                            + " encountered when handshaking");
                             continue; // try again
                        case CLOSED:
                             throw new IOException("SSLEngine closed");
                        case OK:
                             checkHandshake();
                             break;
                   if (!flush()) {
                        break;
              return written;
         private boolean hasRemaining(ByteBuffer[] src) {
              for (ByteBuffer b : src) {
                   if (b.hasRemaining()) {
                        return true;
              return false;
          * Encrypts data and writes it to the channel.
          * @param src
          *            the data to write
          * @return the number of bytes written
          * @throws IOException
          *             if there are errors.
          * @throws IllegalStateException
          *             if the initial handshake isn't complete
         @Override
         public long write(ByteBuffer[] src) throws IOException {
              if (!initialHandshakeDone) {
                   throw new IllegalStateException("Initial handshake incomplete");
              if (!flush()) {
                   return 0;
              int written = 0;
              outer: while (hasRemaining(src)) {
                   outNet.clear(); // we flushed it
                   SSLEngineResult result = engine.wrap(src, outNet);
                   outNet.flip();
                   switch (result.getStatus()) {
                        case BUFFER_UNDERFLOW:
                             break outer; // not enough left to send (prob won't
                        // happen - padding)
                        case BUFFER_OVERFLOW:
                             if (!flush()) {
                                  break outer; // can't remake while still have
                                  // stuff to write
                             int size = engine.getSession().getPacketBufferSize();
                             if (outNet.capacity() < size) {
                                  outNet = ByteBuffer.allocate(size);
                             } else { // shouldn't happen
                                  throw new RuntimeException(hsStatus
                                            + " encountered when handshaking");
                             continue; // try again
                        case CLOSED:
                             throw new IOException("SSLEngine closed");
                        case OK:
                             checkHandshake();
                             break;
                   if (!flush()) {
                        break;
              return written;
         private void checkHandshake() throws IOException {
              // Thread.dumpStack();
              // System.out.println(engine.getHandshakeStatus());
              outer: while (true) {
                   switch (engine.getHandshakeStatus()) {
                        case NOT_HANDSHAKING:
                             initialHandshakeDone = true;
                             handshaking = false;
                             rereg(SelectionKey.OP_READ | SelectionKey.OP_WRITE);
                             return;
                        case FINISHED:
                             // this shouldn't happen, I don't think. If it does, say
                             // where.
                             System.err.println("Detected FINISHED in checkHandshake");
                             Thread.dumpStack();
                             break outer;
                        case NEED_TASK:
                             if (isTasking) {
                                  while (isTasking) { // TODO: deal with by reg?
                                       Thread.yield();
                                       try {
                                            Thread.sleep(1);
                                       } catch (InterruptedException ex) {
                                            // TODO Auto-generated catch block
                                            ex.printStackTrace();
                                  break;
                             doTasks();
                             break;
                        case NEED_WRAP:
                             rereg(SelectionKey.OP_WRITE);
                             break outer;
                        case NEED_UNWRAP:
                             rereg(SelectionKey.OP_READ);
                             break outer;
              handshaking = true;
              hsStatus = engine.getHandshakeStatus();
          * @return true if the channel is open and no shutdown message has been
          *         recieved.
         @Override
         public boolean isOpen() {
              return super.isOpen() && !engine.isInboundDone();
    }

    That's the reason for checkHandshake(), it is called on every read and write and detects a new handshake and configures the setup properly. As far as the server requesting a new handshake, I did not put that in. It would be simple enough though, you would just need to call SSLEngine.beginHandshake() + then call checkHandshake().
    Also, my echo server example had a bug, I forgot to call bu.flip() before queueWrite(), so I fixed that, as well as adding an onConnect method that is called when a connection has been established. The new version should be up at the origional address shortly.

  • SSLSocket on client & NIO w/ SSLEngine on server

    Hi, I have a question about NIO & SSL...
    Does it make sense to use SSLSocket on the client-side to connect to a server, which uses NIO w/ SSLEngine?
    In my current code the server side is set up to be non-blocking. The handshaking part on the client side seems to work fine with the server's NIO & SSLEngine code, but after that it behaves oddly on the first read for application data (on the server-side). My SSLEngineResult from the unwrap of the first read has zero bytes for both produced and consumed. Not sure why...any thoughts?

    Thanks for the replies.
    I'm using the sample code that comes with the Java 5.0 SE. Although, I modified it a bit (the example is set up for an HTTP server).
    The read method looks like this:
    int read() throws IOException
            SSLEngineResult result;
            if (!initialHSComplete)
                throw new IllegalStateException();
            int pos = requestBB.position();
            if (sc.read(inNetBB) == -1)
                sslEngine.closeInbound();  // probably throws exception
                return -1;
            do
                resizeRequestBB();    // guarantees enough room for unwrap
                inNetBB.flip();
                result = sslEngine.unwrap(inNetBB, requestBB);
                inNetBB.compact();
                * Could check here for a renegotation, but we're only
                * doing a simple read/write, and won't have enough state
                * transitions to do a complete handshake, so ignore that
                * possibility.
                switch (result.getStatus())
                    case BUFFER_UNDERFLOW:
                    case OK:
                        if (result.getHandshakeStatus() == HandshakeStatus.NEED_TASK)
                            doTasks();
                        break;
                    default:
                        throw new IOException("sslEngine error during data read: " +
                                result.getStatus());
            } while ((inNetBB.position() != 0) &&
                    result.getStatus() != Status.BUFFER_UNDERFLOW);
            return (requestBB.position() - pos);
        }It returns from that method with the Status.BUFFER_UNDERFLOW.

  • SSLEngine usage issue: handshake done, but unwrap returns 8 bytes from 32

    Hello,
    I'm trying to use SSLEngine API in order to secure Java/NIO based 3th party middle-ware platform. So far I've succeed with writing correct handshake code and on both server and client I get handshake successfully done, the problem starts when client sends server its message. It is 32 bytes long encrypted on the client side to 37 bytes. On the server side I see (while using -Djavax.net.debug=all) that during the SSLEngine.unwrap call the bytes are correctly decrypted into exact byte sequence as on the client side. However, the problem is that from SSLEngine.unwrap I get just 8 bytes instead of those 32. The debug messages looks:
    [Raw read (bb)]: length = 37
    0000: 17 03 01 00 20 56 68 6E 1F 56 C1 41 6E CD C0 A4 .... Vhn.V.An...
    0010: F0 84 6A E9 C8 4F A9 AE 29 AF 87 D9 EA 61 09 15 ..j..O..)....a..
    0020: EC 08 28 1E 60 ..(.`
    Padded plaintext after DECRYPTION: len = 32
    0000: 02 00 01 00 03 63 64 6F E3 06 78 5A D6 9C D4 D0 .....cdo..xZ....
    0010: 68 B1 F7 B1 7F 34 88 AC 36 1C 7A 72 03 03 03 03 h....4..6.zr....
    *** SERVER: peerNetBuf after unwrap: java.nio.HeapByteBuffer[pos=37 lim=37 cap=16665]
    *** SERVER: res: Status = OK HandshakeStatus = NOT_HANDSHAKING
    bytesConsumed = 37 bytesProduced = 8
    Messages starting with *** SERVER are of my application. Everything other is emitted by Java while using -Djavax.net.debug=all. As you can see all data from peerNetBuf which is a buffer holding encrypted data got from network, so all those data are consumed well -- so I don't need to call unwrap second time like it sometimes happen during the handshake phase...
    Now, my question is: how to convince SSLEngine.unwrap to correctly return me all those 32 bytes which I expect?
    Thanks,
    Karel

    You will have to post some code. The SSLEngine tells you what it wants you to do next, all you really have to do is keep doing that: wrap, unwrap when needed, or write on an overflow and read on an underflow. Was there enough room in your app buffer for all 32 bytes? And what was the final result status?

  • SSLHandshakeException: no Cipher suits in common

    Hi
    I have created a self signed certificate using keytool utility using RSA algorithm, key algorithm as SHA1WITHRSA. When I am trying to proxy the requests from IIS 7.5, I am getting below exception in weblogic logs.
    Please let me know how do I go about debugging this.
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <DynamicJSSEListenThread[DefaultSecure] 33 cipher suites enabled:>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_RSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_RSA_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_DSS_WITH_AES_128_CBC_SHA256>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_RSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_RSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_RSA_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_DSS_WITH_AES_128_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_ECDSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_RSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <SSL_RSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_RSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_ECDSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_RSA_WITH_RC4_128_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <SSL_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <SSL_RSA_WITH_RC4_128_MD5>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_RSA_WITH_RC4_128_MD5>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <TLS_EMPTY_RENEGOTIATION_INFO_SCSV>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[DynamicJSSEListenThread[DefaultSecure],9,WebLogicServer]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setWantClient
    Auth(boolean): value=false.>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[DynamicJSSEListenThread[DefaultSecure],9,WebLogicServer]]weblogic.security.SSL.jsseadapter: SSLENGINE: SSLEngine.setUseClientM
    ode(boolean): value=false.>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseada
    pter: SSLENGINE: SSLEngine.unwrap(ByteBuffer,ByteBuffer[]) called: result=Status = OK HandshakeStatus = NEED_TASK
    bytesConsumed = 52 bytesProduced = 0.>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseada
    pter: SSLENGINE: Exception occurred during SSLEngine.wrap(ByteBuffer,ByteBuffer).
    javax.net.ssl.SSLHandshakeException: no cipher suites in common
            at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1362)
            at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
            at sun.security.ssl.SSLEngineImpl.writeAppRecord(SSLEngineImpl.java:1197)
            at sun.security.ssl.SSLEngineImpl.wrap(SSLEngineImpl.java:1169)
            at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:469)
            at weblogic.security.SSL.jsseadapter.JaSSLEngine$1.run(JaSSLEngine.java:68)
            at weblogic.security.SSL.jsseadapter.JaSSLEngine.doAction(JaSSLEngine.java:732)
            at weblogic.security.SSL.jsseadapter.JaSSLEngine.wrap(JaSSLEngine.java:66)
            at weblogic.socket.JSSEFilterImpl.wrapAndWrite(JSSEFilterImpl.java:619)
            at weblogic.socket.JSSEFilterImpl.doHandshake(JSSEFilterImpl.java:91)
            at weblogic.socket.JSSEFilterImpl.doHandshake(JSSEFilterImpl.java:64)
            at weblogic.socket.JSSEFilterImpl.isMessageComplete(JSSEFilterImpl.java:282)
            at weblogic.socket.SocketMuxer.readReadySocketOnce(SocketMuxer.java:962)
            at weblogic.socket.SocketMuxer.readReadySocket(SocketMuxer.java:889)
            at weblogic.socket.JavaSocketMuxer.processSockets(JavaSocketMuxer.java:339)
            at weblogic.socket.SocketReaderRequest.run(SocketReaderRequest.java:29)
            at weblogic.work.ExecuteThread.execute(ExecuteThread.java:256)
            at weblogic.work.ExecuteThread.run(ExecuteThread.java:221)
    Caused By: javax.net.ssl.SSLHandshakeException: no cipher suites in common
            at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
            at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1639)
            at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:278)
            at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:266)
            at sun.security.ssl.ServerHandshaker.chooseCipherSuite(ServerHandshaker.java:892)
            at sun.security.ssl.ServerHandshaker.clientHello(ServerHandshaker.java:620)
            at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:167)
            at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
            at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
            at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
            at java.security.AccessController.doPrivileged(Native Method)
            at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
            at weblogic.socket.JSSEFilterImpl.doTasks(JSSEFilterImpl.java:186)
            at weblogic.socket.JSSEFilterImpl.doHandshake(JSSEFilterImpl.java:95)
            at weblogic.socket.JSSEFilterImpl.doHandshake(JSSEFilterImpl.java:64)
            at weblogic.socket.JSSEFilterImpl.isMessageComplete(JSSEFilterImpl.java:282)
            at weblogic.socket.SocketMuxer.readReadySocketOnce(SocketMuxer.java:962)
            at weblogic.socket.SocketMuxer.readReadySocket(SocketMuxer.java:889)
            at weblogic.socket.JavaSocketMuxer.processSockets(JavaSocketMuxer.java:339)
            at weblogic.socket.SocketReaderRequest.run(SocketReaderRequest.java:29)
            at weblogic.work.ExecuteThread.execute(ExecuteThread.java:256)
            at weblogic.work.ExecuteThread.run(ExecuteThread.java:221)
    >
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseada
    pter: SSLENGINE: SSLEngine.closeOutbound(): value=closed.>
    <26 Nov, 2014 7:29:42 PM IST> <Debug> <SecuritySSL> <BEA-000000> <[Thread[[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)',5,Pooled Threads]]weblogic.security.SSL.jsseada
    pter: SSLENGINE: SSLEngine.wrap(ByteBuffer,ByteBuffer) called: result=Status = CLOSED HandshakeStatus = NEED_UNWRAP
    bytesConsumed = 0 bytesProduced = 7.>
    Regards
    PPK

    Hi gimbal2,
    I've already googled the error but I didn't find anything useful: however I will try again.
    Thank you,
    AndreaWeird, because the first result I got was a highly informative stackoverflow post. I think you need to blame more what you were looking for: you were looking for a cut, copy and paste solution in stead of searching for information to understand the problem and solve it. But that is conjecture on my part, feel free to ignore me.I read that stackoverflow post (about forcing the RSA algorithm instead of the default DSA) some days ago but didn't fully understant it; now I first generated a keystore with the RSA algorithm then I imported the certificate and now it almost works, I.E. now warns me about the certificate not being trusted while it should (I can see the issuer in the Trusted Root CA of the browser). To recap:
    - in every browser at the customer sites there are two certificates installed (one intermediate and one wildcard)
    - the customer can use a Web MS application and has imported a certificate in IIS, so I exported this certificate and imported it in the keystore but I get the error about the CA not being trusted.
    So now it's not working and I will try to import the intermediate and the wildcard certificate (I think this could solve). I will post the result.
    Thank you gimbal2.

Maybe you are looking for

  • Error attempting to write file in .png format

    Hello All, I am stuck on a problem that I can not find a solution to.  We receive customer prints saved as a PDF and then save them as a PNG file to import them in to Excel. Up until this morning this has never been a problem.  On the Windows 7 machi

  • SOAP with SSL in weblogic 5.1

    Hello! Any idea of using SOAP with SSL in weblogic 5.1.?? My webservice works properly when I use http, but it doesn't work with http. It's very important to me, to get a solution for this problem!! Many thanks. Best regards, Rafa.

  • HT5622 Is there any way to delete my apple id because i currently have 3 and i only need one. please help

    is there any way to delete my apple id because i currently have 3 and i only need one. please help. thanks

  • Watermarks

    We would like to create a watermark or overlay onto a document at the time of print. Does anyone know how to do that in Adobe Acrobat 8.0 Professional?

  • ZCM 11.2 reporting server won't install

    Hello, A couple months ago I upgraded to ZCM 11.2 (from 11.0) on SLES 11 SP1. Now I am attempting to upgrade the reporting server. I initially ran the install (setup.sh) and it told me ZRS was alrady installed. So I ran zrsuninstall.sh and that took