使用p12证书

时间:2016-07-14 13:43:34

标签: java https client

我一直在努力研究一个项目,该项目包括从具有Https连接的服务器调用方法。 我得到了404代码,但地址存在,所以这是证书的问题。

到目前为止,我有这段代码:

System.setProperty("javax.net.ssl.keyStoreType", "pkcs12");
    System.setProperty("javax.net.ssl.trustStoreType", "jks");
    System.setProperty("javax.net.ssl.keyStore", "./cert/walkiriaapps_dev_cert.p12");
    System.setProperty("javax.net.ssl.trustStore", "./cert/gridserver.keystore");
    System.setProperty("javax.net.debug", "ssl");
    System.setProperty("javax.net.ssl.trustStorePassword", trustStorePassword);
    System.setProperty("javax.net.ssl.keyStorePassword", keyStorePassword);

    try {
        SSLSocketFactory sslsocketfactory = (SSLSocketFactory) SSLSocketFactory.getDefault();
        URL url = new URL(SERVER_URL);
        HttpsURLConnection conn = (HttpsURLConnection)url.openConnection();
        conn.setSSLSocketFactory(sslsocketfactory);

        System.out.println(conn.getResponseCode());
        InputStream inputstream = conn.getInputStream();
        InputStreamReader inputstreamreader = new InputStreamReader(inputstream);
        BufferedReader bufferedreader = new BufferedReader(inputstreamreader);

        String string = null;
        while ((string = bufferedreader.readLine()) != null) {
            System.out.println("Received " + string);
        }
    } catch (MalformedURLException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    } catch (IOException e) {
        // TODO Auto-generated catch block
        e.printStackTrace();
    }

启用调试后,我会收到以下信息:

keyStore is : ./cert/walkiriaapps_dev_cert.p12 keyStore type is : pkcs12 keyStore provider is :  init keystore init keymanager of type SunX509
*** found key for : [hidden by me ;)] chain [0] = [ [   Version: V3   Subject: [hidden by me ;)]   Signature Algorithm: SHA1withRSA, OID
=xxxxxx

  Key:  Sun RSA public key, 2048 bits   modulus: 25618728526980407715404586197565746577652430166924543443958281662634742897052603095095758511147901575124400320179797331860716646860486870953395736561894316707521150349144946687953313723171397095268376530520667100869163032007829998448800202165918944214576419025925092328986301138158279604039024071057779082107833750510476901348232496212394760754318237941183777058043657818962756546399885751494495606397844915051787505208471929043203878929121386289922849774283250681494624102067989726841385828897870956338426474470018535626512167695988102150213586310503588030098931234831662882919587388701417158847960514277726029356783 public exponent: 65537   Validity: [From: Sat Jul 02 12:29:45 CEST 2016,
               To: Sun Jul 02 12:29:45 CEST 2017]   Issuer: [hidden by me ;)]   SerialNumber: [    02]

Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0 86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C            8w., ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:false   PathLen: undefined ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   DigitalSignature   Key_Encipherment   Data_Encipherment   Key_Agreement ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 19 49 F6 4E CD 69 10 5E   3D 97 2C 09 4C 57 2B 65  .I.N.i.^=.,.LW+e 0010: FD 32 3E B3 80 B0 9B D6   9C 67 27 F2 BC B4 97 A7  .2>......g'..... 0020: D7 BC 71 B6 3A B6 39 02   94 34 97 32 2E 74 A2 35  ..q.:.9..4.2.t.5 0030: 30 C5 2A 99 4F D0 1B 64   B1 3B 0A 69 18 68 A8 73  0.*.O..d.;.i.h.s 0040: 5A 26 3B 61 A6 18 C7 A3   D7 85 8C 7D 5B 07 08 69  Z&;a........[..i 0050: 6A 32 AC 2B 7A F8 E6 42   07 84 BA A6 E4 F1 AD B6  j2.+z..B........ 0060: E5 FB 78 55 97 27 80 ED   49 49 54 E8 D0 E2 96 09  ..xU.'..IIT..... 0070: 1B 75 D7 4A 53 C5 70 8B   CF 76 60 65 9D 1D 39 0E  .u.JS.p..v`e..9. 0080: 32 39 88 7C C4 7B 48 3D   C3 FF 73 C5 7E 65 B1 08 
29....H=..s..e.. 0090: 1B 56 60 B2 45 87 09 50   14 7C 30 20 CD EC 33 78  .V`.E..P..0 ..3x 00A0: B9 46 47 36 E8 58 AA 03   DA DC F6 0D C7 0B E5 24  .FG6.X.........$ 00B0: 36 4A F2 D6 32 93 CF A6   83 E0 82 70 85 29 A7 34  6J..2......p.).4 00C0: 03 9F 16 93 C3 15 43 6E   FE 8C 20 26 38 0F B2 F4  ......Cn.. &8... 00D0: C8 AC 5F 0F 2D 40 2A 2E   EC 47 49 F6 AD D3 67 03  .._.-@*..GI...g. 00E0: E6 DF BA DC 47 38 E1 68   92 1D 52 C8 A0 A7 CE 91  ....G8.h..R..... 00F0: C1 FF 21 59 F1 E9 F6 7B   2D 80 00 02 C7 52 43 08  ..!Y....-....RC.

]
*** trustStore is: ./cert/gridserver.keystore trustStore type is : jks trustStore provider is :  init truststore adding as trusted cert:   Subject: [hidden by me ;)]   Issuer:  C[hidden by me ;)]   Algorithm: RSA; Serial number: 0x2   Valid from Sun Jun 05 18:14:09 CEST 2016 until Sat Jun 05 18:14:09 CEST 2021

trigger seeding of SecureRandom done seeding SecureRandom Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called %% No cached client session
*** ClientHello, TLSv1 RandomCookie:  GMT: 1451660641 bytes = { 57, 105, 46, 174, 145, 121, 25, 154, 153, 98, 42, 167, 8, 12, 239, 100, 189, 241, 227, 213, 2, 113, 124, 68, 83, 172, 29, 43 } Session ID:  {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods:  { 0 } Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1} Extension ec_point_formats, formats: [uncompressed] Extension server_name, server_name: [host_name: demo.iquvo.com]
*** main, WRITE: TLSv1 Handshake, length = 130 main, READ: TLSv1 Handshake, length = 89
*** ServerHello, TLSv1 RandomCookie:  GMT: -1444518719 bytes = { 36, 208, 126, 45, 135, 54, 250, 142, 92, 198, 36, 156, 192, 11, 103, 194, 152, 198, 167, 103, 143, 118, 208, 42, 70, 245, 183, 60 } Session ID:  {23, 159, 75, 230, 109, 209, 13, 253, 76, 213, 99, 240, 87, 145, 195, 170, 169, 39, 162, 123, 163, 19, 46, 187, 67, 117, 144, 64, 92, 177, 195, 191} Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
*** %% Initialized:  [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA main, READ: TLSv1 Handshake, length = 982
*** Certificate chain chain [0] = [ [   Version: V3   Subject: CN=demo.iquvo.com, OU=iquvo Systems, O=iquvo, L=Madrid, ST=Madrid, C=ES   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits   modulus: 23453645515854966924301205454696625328671479972464738543799836932127583641533813201400570740442560086912845820094275679055549988049658631777847332739248681132642932519165249875037014213452555762465878771543919238414780931857222019527866816147448967113080291383819384893029975957613712051652474661438461078816940552511636651932730286186599058948852155547351329972057697689307521243133360393947364340527532395277333228473022288074415918366159232974257664555640802067520693478750525144409451882709715874673237455724895036797475043632724593718904286605604489464163002898051877745616161768837246505670061362321331950680997 public exponent: 65537   Validity: [From: Tue Jul 12 23:42:19 CEST 2016,
               To: Sat Jun 05 18:14:09 CEST 2021]   Issuer: [hidden by me ;)]   SerialNumber: [    03]

Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0 86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C            8w., ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:false   PathLen: undefined ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   emailProtection   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   DigitalSignature   Key_Encipherment   Data_Encipherment   Key_Agreement ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 45 64 14 E0 A0 20 C0 86   EC 28 23 69 B1 93 D7 15  Ed... ...(#i.... 0010: A1 5C 19 80 20 8A BF E8   00 AF A6 C1 D5 98 4B BA  .\.. .........K. 0020: EC BC F4 20 3E 04 AE 2A   AD D6 9D E8 CD 5E 22 DB  ... >..*.....^". 0030: 54 38 87 AC 3E C9 AE DC   F9 F4 EA AF 90 68 53 8A  T8..>........hS. 0040: 95 E9 18 4E 71 60 A8 55   C8 93 D7 EF 05 2C A9 0F  ...Nq`.U.....,.. 0050: AA 54 D0 27 A4 8F 57 58   63 0E 02 5E 6D ED A1 8F  .T.'..WXc..^m... 0060: EC B9 6E 58 49 D1 B2 FF   F9 A4 19 06 83 B9 3B 12  ..nXI.........;. 0070: DA 62 2D B1 9B EC FB 52   DC 1A 5B 32 4A 14 3F EC  .b-....R..[2J.?. 0080: 2D 5F 1C 86 90 29 D9 89   A7 B0 76 DA 2C 17 98 A1 
-_...)....v.,... 0090: 81 C7 22 E8 AD 52 1A 88   D3 19 24 D9 E0 63 56 04  .."..R....$..cV. 00A0: 5A C7 AC 00 7F 90 84 0F   44 F9 3C 5F 45 C8 2B F2  Z.......D.<_E.+. 00B0: 55 7F C6 EE B8 82 4F B0   E6 42 9D 66 1C CD D3 C0  U.....O..B.f.... 00C0: 00 36 31 EB 65 6B 94 BC   82 4D 07 53 21 B9 A3 66  .61.ek...M.S!..f 00D0: 5A C9 40 A8 2D B0 BB 73   84 94 9F 5B D7 81 F2 E3  Z.@.-..s...[.... 00E0: 15 9B D3 F6 A1 8E 02 1B   E6 61 2A 78 27 28 8F 9C  .........a*x'(.. 00F0: 3F 3D 78 A9 3A 27 A3 6D   92 20 4D B2 21 0F FE 98  ?=x.:'.m. M.!...

]
*** Found trusted certificate: [ [   Version: V3   Subject: [hidden by me ;)]   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits   modulus: 21150877640234016381111274098046984118683206683014739756833065339354409251839034422389305077192144292296518982097404972859365369550733381248230874970257083954569244169241161038537457114078913978977609733079736696758855067361535741860901054811684551240975716527800277810041882930012408864592120187014516031281102491071972501707919016868527591234611111398168176959894432634785347671362404715931317393588706237672365619642155446754496385612099649836213550463477173184091172816433791766397039664840301452611626359011252247894238973019470395261962737635899132289408179107156743574679199231017113344711234513933791463056697 public exponent: 65537   Validity: [From: Sun Jun 05 18:14:09 CEST 2016,
               To: Sat Jun 05 18:14:09 CEST 2021]   Issuer: CN=iquvo Root CA, OU=IT, O=iquvo, L=Madrid, ST=Madrid, C=ES   SerialNumber: [   02]

Certificate Extensions: 5 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 2F 23 F4 86 C9 49 F1 6B 6D 7A 04 16 EE C9 51 E3  /#...I.kmz....Q. 0010: 62 AE C1 F0            b... ] ]

[2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[   CA:true PathLen:2147483647 ]

[3]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [   clientAuth   serverAuth ]

[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [   Key_Encipherment   Data_Encipherment   Key_Agreement   Key_CertSign ]

[5]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 41 73 44 CA 83 7C 81 B0   86 7B B4 0D E9 13 BD 71  AsD............q 0010: 38 77 01 2C                                 8w., ] ]

]   Algorithm: [SHA1withRSA]   Signature: 0000: 56 16 97 C3 4A 99 48 EB   B8 B9 DC 8D 86 3C 35 88  V...J.H......<5. 0010: 7A 41 29 D5 3E 60 C6 2C   A0 94 31 CB 80 AD 30 25  zA).>`.,..1...0% 0020: DE 31 62 16 FC EF 84 94   64 CD F7 68 59 11 D8 EA  .1b.....d..hY... 0030: 39 0A C1 E3 86 CF B1 EC   B0 1F 3C 31 FD 27 CA B3  9.........<1.'.. 0040: 52 E9 AF 69 BC F0 D7 E3   E1 43 CB 5A 1B 66 1B 39  R..i.....C.Z.f.9 0050: 06 79 40 53 40 FF FA 6E   A6 76 A0 31 4D 4B DA 6F  .y@S@..n.v.1MK.o 0060: 72 02 E6 F0 37 B5 33 98   60 C8 7B 38 EA FE BC 5F  r...7.3.`..8..._ 0070: D1 47 7F 9D 16 7B 02 3E   47 C6 15 1A 98 9F 80 EE  .G.....>G....... 0080: A7 36 96 37 0D 21 F8 89   99 F7 31 EF 2A 6F AA AC  .6.7.!....1.*o.. 0090: 1F 5D F4 B2 8C 78 A8 16   15 E7 D7 66 DF 0A 82 14  .]...x.....f.... 00A0: 09 71 20 7F 82 56 76 69   FC 12 6E B6 8F B2 73 94  .q ..Vvi..n...s. 00B0: C4 D8 FD E5 D5 58 A8 30   3B C4 E9 5B F3 91 10 AA  .....X.0;..[.... 00C0: E6 A1 49 23 51 0F 52 6F   93 C0 B4 9B C1 BB C8 D5  ..I#Q.Ro........ 00D0: 50 C7 19 78 F5 07 F0 9F   87 C6 E1 B2 65 03 ED 93  P..x........e... 00E0: EF D3 D9 F4 EB 02 1D 2D   E5 BB BB B1 84 43 37 E2  .......-.....C7. 00F0: DC 00 BD 54 5B 61 25 A1   AB 44 F5 54 DC 1D 52 53  ...T[a%..D.T..RS 0100: 16 D0 34 2F BD BE B4 4C   A7 8C 1C 2A CB F1 90 C1  ..4/...L...*.... 0110: AD 42 2D CF 8A 43 2E B6   4D 4C 2A B0 2D 0F 5B 5F  .B-..C..ML*.-.[_ 0120: 97 D0 E8 3C 1D C1 2D 90   4E 0F C6 DA 96 9C 9B DF  ...<..-.N....... 0130: 92 FA 82 82 51 78 14 99   B9 D3 7B 6B FC 72 B6 EE  ....Qx.....k.r.. 0140: C1 B4 55 73 68 43 4B F3   0A 6B 96 78 31 3B FC C7  ..UshCK..k.x1;.. 0150: 5D CC 7B 96 F8 AC 84 6C   FA CA 91 9D DA B9 43 44  ]......l......CD 0160: 2F 81 78 1F 66 41 B8 6C   67 16 78 1C CF 1D 63 75  /.x.fA.lg.x...cu 0170: DC 7E 4E 15 DB A9 C0 5D   16 C3 55 A8 B2 B8 7A C3  ..N....]..U...z. 0180: 4A C5 B4 11 33 6F 50 56   8A 94 35 22 7E 7D 92 4D  J...3oPV..5"...M 0190: 2D F9 F8 06 12 41 35 D3   64 9D AA 43 BA C7 22 F5 
-....A5.d..C..". 01A0: 05 EB 32 0E 90 FD B2 0A   E8 EC 6B 06 1A 08 84 87  ..2.......k..... 01B0: 57 6D 40 07 5F 21 B6 E6   0D FC D4 A2 95 FD 0A 36  Wm@._!.........6 01C0: 30 37 76 44 F3 5F 91 75   78 CB 9C 17 6B EE 7F 22  07vD._.ux...k.." 01D0: D2 C5 35 62 13 1E 19 EC   FE 17 2E 44 3D 5C 4E 3D  ..5b.......D=\N= 01E0: 22 6D 49 FC 67 83 F4 64   0E 25 F8 B1 D4 01 94 86  "mI.g..d.%...... 01F0: 9D CC 59 60 6E 1D E2 6D   8C 0D 4A 2E C8 FC 96 65  ..Y`n..m..J....e 0200: 54 D2 B4 81 A7 46 FC FD   76 62 DF 35 FF 57 6D 52  T....F..vb.5.WmR 0210: 80 5A B8 55 CB 9F 30 9C   F7 9A AB F3 F6 03 2C 24  .Z.U..0.......,$ 0220: F3 C4 EB 69 D0 5E BC 88   23 79 B6 AF B4 3E 99 D6  ...i.^..#y...>.. 0230: 23 A0 9E 38 EB 6E 07 DC   73 68 29 B0 BF 31 9C 5B  #..8.n..sh)..1.[ 0240: 98 6A C5 35 D4 BD C3 C9   84 76 57 4E 8D FE D8 B1  .j.5.....vWN.... 0250: 61 CC 6C 21 0D 81 AF FC   9C 25 C9 3B 63 89 AA BA  a.l!.....%.;c... 0260: D2 B4 EE 55 F1 91 D0 11   9C 6C B1 19 D8 F1 AF 5A  ...U.....l.....Z 0270: 61 B0 50 A4 2E 67 3A 70   7B 21 02 5B 01 97 F6 13  a.P..g:p.!.[....

] main, READ: TLSv1 Handshake, length = 331
*** ECDH ServerKeyExchange Server key: SunPKCS11-NSS EC public key, 256 bits (id 1, session object)   public x coord: 108716438294959703938428424752528805236505078799371900849087416902745394709600 public y coord: 57795240448396850305572109632694865628751011045103794660332140731467128933682 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) main, READ: TLSv1 Handshake, length = 4
*** ServerHelloDone
*** ECDHClientKeyExchange ECDH Public value:  { 4, 0, 7, 233, 95, 210, 116, 207, 113, 216, 119, 101, 210, 13, 4, 36, 106, 106, 135, 250, 172, 165, 233, 23, 130, 142, 31, 62, 236, 215, 18, 31, 93, 5, 70, 11, 193, 130, 163, 152, 108, 208, 250, 103, 139, 13, 176, 206, 126, 164, 7, 239, 85, 47, 156, 118, 240, 99, 179, 128, 103, 164, 96, 137, 85 } main, WRITE: TLSv1 Handshake, length = 70 SESSION KEYGEN: PreMaster Secret: 0000: 5F BA 2A 35 33 D4 12 7C   F1 D6 3D 50 64 75 F4 72 
_.*53.....=Pdu.r 0010: 69 ED F1 56 1E 7E 1D 87   48 EF E9 A3 1B 91 56 31  i..V....H.....V1 CONNECTION KEYGEN: Client Nonce: 0000: 57 87 95 61 39 69 2E AE   91 79 19 9A 99 62 2A A7  W..a9i...y...b*. 0010: 08 0C EF 64 BD F1 E3 D5   02 71 7C 44 53 AC 1D 2B  ...d.....q.DS..+ Server Nonce: 0000: AA E6 65 C1 24 D0 7E 2D   87 36 FA 8E 5C C6 24 9C  ..e.$..-.6..\.$. 0010: C0 0B 67 C2 98 C6 A7 67   8F 76 D0 2A 46 F5 B7 3C  ..g....g.v.*F..< Master Secret: 0000: 41 8A E8 BC 20 58 1D AE   3A 3F 12 52 29 CF 6F 12  A... X..:?.R).o. 0010: EA 0B 6B 4E C1 25 18 26   0E 1C C3 F3 A8 76 FD 39  ..kN.%.&.....v.9 0020: 44 52 B4 A0 74 A8 B6 E9   5F 76 1D C4 34 6D 95 E2  DR..t..._v..4m.. Client MAC write Secret: 0000: DF 20 3D 63 00 EE 2B EA   5D 59 94 01 34 C8 3A 90  .
=c..+.]Y..4.:. 0010: B8 3C 2B 2F                                        .<+/ Server MAC write Secret: 0000: 2B 0E 4B AA EC FD 54 EB   40 6C C1 0F 13 54 FD 47  +.K...T.@l...T.G 0010: A1 53 A6 02                     .S.. Client write key: 0000: 26 60 BE EC AB 06 75 E2   02 B4 39 61 35 62 0C 84  &`....u...9a5b.. 0010: 16 CB 80 19 93 79 80 01   B6 6B E9 0C F5 4F BA DB  .....y...k...O.. Server write key: 0000: B6 2C DA 3D 00 44 2A 80   6F 65 47 36 EB A8 D7 40  .,.=.D*.oeG6...@ 0010: 0C CC CD 89 08 A1 7B 85   B4 7B 4E 6D EE 10 5F 9A  ..........Nm.._. Client write IV: 0000: 8B CB FE C2 FA 56 A3 C9   7E E5 FA E9 C8 76 F3 40  .....V.......v.@ Server write IV: 0000: 5A C8 CC E7 91 D9 31 77   1B 10 A3 57 5B D1 CC 9C  Z.....1w...W[... main, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished verify_data:  { 184, 20, 223, 36, 23, 103, 162, 66, 34, 130, 130, 172 }
*** main, WRITE: TLSv1 Handshake, length = 48 main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 48
*** Finished verify_data:  { 11, 150, 72, 24, 35, 222, 227, 77, 59, 153, 109, 157 }
*** %% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] main, WRITE: TLSv1 Application Data, length = 192 main, READ: TLSv1 Application Data, length = 368

我感谢任何使我指向正确方向的帮助。

感谢。

1 个答案:

答案 0 :(得分:0)

问题是网址错误。

如果有人需要示例代码,我会在此处留下问题。

感谢。