Created
July 24, 2015 09:55
-
-
Save niclash/9ee4e5c2e1f97e2e7dee to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
niclas@node1:~/temp/apache-zest-java-2.1-RC0-src$ ./gradlew -Djavax.net.debug=ssl:handshake -Dversion=2.1-RC0 assemble -x signArchives | |
Downloading https://services.gradle.org/distributions/gradle-2.5-all.zip | |
keyStore is : | |
keyStore type is : jks | |
keyStore provider is : | |
init keystore | |
init keymanager of type SunX509 | |
trustStore is: No File Available, using empty keystore. | |
trustStore type is : jks | |
trustStore provider is : | |
init truststore | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
main, setSoTimeout(0) called | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
%% No cached client session | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1420954424 bytes = { 231, 217, 18, 212, 128, 8, 101, 37, 56, 239, 162, 109, 22, 94, 255, 226, 193, 113, 247, 21, 156, 210, 168, 84, 110, 229, 220, 194 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA | |
Extension server_name, server_name: [type=host_name (0), value=services.gradle.org] | |
*** | |
main, WRITE: TLSv1.2 Handshake, length = 277 | |
main, READ: TLSv1 Handshake, length = 81 | |
*** ServerHello, TLSv1 | |
RandomCookie: GMT: 1420954423 bytes = { 168, 179, 253, 46, 201, 175, 190, 128, 126, 127, 173, 64, 71, 124, 114, 87, 32, 108, 118, 100, 238, 167, 2, 108, 60, 193, 251, 252 } | |
Session ID: {135, 9, 146, 122, 216, 11, 231, 169, 66, 52, 252, 147, 24, 176, 8, 136, 157, 172, 17, 109, 43, 148, 110, 125, 90, 96, 14, 157, 144, 56, 154, 41} | |
Cipher Suite: SSL_RSA_WITH_RC4_128_SHA | |
Compression Method: 0 | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
*** | |
%% Initialized: [Session-1, SSL_RSA_WITH_RC4_128_SHA] | |
** SSL_RSA_WITH_RC4_128_SHA | |
main, READ: TLSv1 Handshake, length = 2501 | |
*** Certificate chain | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=services.gradle.org, O="Gradleware, Inc.", L=San Francisco, ST=California, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 23860616774738315887175333140554162547761645640950561273564894300587035698800043407444995673742682677328228742365278438128661404920072451286440283774784834146427820947122595478682042223136539669553338435698419370515315296321092380589254997234421252020011286433318683758812585105907721972105747607857579487469715168268882905622053885186220900768907869043167418082510016484338351320292518337470647901931147101507223004865435332925582171752458274916641435642360571306685126642848336015207429114630081770658198113900468344203057495694820459204852803102650185930379933529733562047463247332595880906128935924279682719500473 | |
public exponent: 65537 | |
Validity: [From: Wed Apr 08 02:00:00 CEST 2015, | |
To: Mon Apr 11 14:00:00 CEST 2016] | |
Issuer: CN=DigiCert SHA2 Secure Server CA, O=DigiCert Inc, C=US | |
SerialNumber: [ 0c4a9495 c805e173 95129af7 14be167d] | |
Certificate Extensions: 9 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.digicert.com | |
, | |
accessMethod: caIssuers | |
accessLocation: URIName: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 0F 80 61 1C 82 31 61 D5 2F 28 E7 8D 46 38 B4 2C ..a..1a./(..F8., | |
0010: E1 C6 D9 E2 .... | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:false | |
PathLen: undefined | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl3.digicert.com/ssca-sha2-g3.crl] | |
, DistributionPoint: | |
[URIName: http://crl4.digicert.com/ssca-sha2-g3.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.16.840.1.114412.1.1] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 64 69 ..https://www.di | |
0010: 67 69 63 65 72 74 2E 63 6F 6D 2F 43 50 53 gicert.com/CPS | |
]] ] | |
] | |
[6]: ObjectId: 2.5.29.37 Criticality=false | |
ExtendedKeyUsages [ | |
serverAuth | |
clientAuth | |
] | |
[7]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_Encipherment | |
] | |
[8]: ObjectId: 2.5.29.17 Criticality=false | |
SubjectAlternativeName [ | |
DNSName: services.gradle.org | |
] | |
[9]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 63 8B D9 CA 61 A7 7D 70 5E AE 0B 7C 08 0E 4E C5 c...a..p^.....N. | |
0010: 49 59 43 6C IYCl | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: C2 51 91 19 B8 8E 61 80 27 E7 63 EB EA 83 5C C6 .Q....a.'.c...\. | |
0010: 71 E1 2E 2A AE F3 3E B9 6B BB 00 D6 1E 13 2C 41 q..*..>.k.....,A | |
0020: B9 10 4C DA 80 71 4F 01 11 FB 9F 52 F1 E3 8A 5A ..L..qO....R...Z | |
0030: 99 70 CD 52 68 C6 7F E0 5C C5 CC A7 22 E6 0A 1A .p.Rh...\..."... | |
0040: B9 CF 8C ED 27 B4 E6 13 17 80 49 19 7F 5D 87 4C ....'.....I..].L | |
0050: 68 60 B5 25 5B 79 A7 B9 01 FC 7C 8C 9E 31 BB FE h`.%[y.......1.. | |
0060: 5C B4 63 01 DC 6B 99 2F A0 97 43 F4 50 19 73 D9 \.c..k./..C.P.s. | |
0070: 1A BE B7 6B B7 0A AD AE 5E C6 56 35 BD BA E8 93 ...k....^.V5.... | |
0080: 5A 8E 7B 98 ED 41 88 71 67 04 38 EF EE 6A 3C 9A Z....A.qg.8..j<. | |
0090: 5A AB A0 AC 2B A3 BD 7C 3E 71 7B E2 06 D2 DE 98 Z...+...>q...... | |
00A0: A1 60 BA 97 A5 D7 68 ED 96 A3 8E 12 6C 70 0A 54 .`....h.....lp.T | |
00B0: 99 E7 97 3F 44 5A 8A DD 0E 5E 4A B3 C5 AD E8 7C ...?DZ...^J..... | |
00C0: 89 D2 AE 28 0A F7 D7 5C 70 27 5C 7E 46 0F 38 3C ...(...\p'\.F.8< | |
00D0: 2C 01 42 9C 8A 23 D1 BD 4F 62 69 24 4A 20 C1 B5 ,.B..#..Obi$J .. | |
00E0: 92 1E 62 F1 A3 5D C3 93 ED 1D 79 3A 9D F3 EE E3 ..b..]....y:.... | |
00F0: 37 B7 A8 B8 5E 13 A9 63 22 EF 62 27 2A 4E E6 6D 7...^..c".b'*N.m | |
] | |
chain [1] = [ | |
[ | |
Version: V3 | |
Subject: CN=DigiCert SHA2 Secure Server CA, O=DigiCert Inc, C=US | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 27858400285679723188777933283712642951289579686400775596360785472462618845441045591174031407467141927949303967273640603370583027943461489694611514307846044788608302737755893035638149922272068624160730850926560034092625156444445564936562297688651849223419070532331233030323585681010618165796464257277453762819678070632408347042070801988771058882131228632546107451893714991242153395658429259537934263208634002792828772169217510656239241005311075681025394047894661420520700962300445533960645787118986590875906485125942483622981513806162241672544997253865343228332025582679476240480384023017494305830194847248717881628827 | |
public exponent: 65537 | |
Validity: [From: Fri Mar 08 13:00:00 CET 2013, | |
To: Wed Mar 08 13:00:00 CET 2023] | |
Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US | |
SerialNumber: [ 01fda3eb 6eca75c8 88438b72 4bcfbc91] | |
Certificate Extensions: 7 | |
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.digicert.com | |
] | |
] | |
[2]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 03 DE 50 35 56 D1 4C BB 66 F0 A3 E2 1B 1B C3 97 ..P5V.L.f....... | |
0010: B2 3D D1 55 .=.U | |
] | |
] | |
[3]: ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:0 | |
] | |
[4]: ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl3.digicert.com/DigiCertGlobalRootCA.crl] | |
, DistributionPoint: | |
[URIName: http://crl4.digicert.com/DigiCertGlobalRootCA.crl] | |
]] | |
[5]: ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 64 69 ..https://www.di | |
0010: 67 69 63 65 72 74 2E 63 6F 6D 2F 43 50 53 gicert.com/CPS | |
]] ] | |
] | |
[6]: ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_CertSign | |
Crl_Sign | |
] | |
[7]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 0F 80 61 1C 82 31 61 D5 2F 28 E7 8D 46 38 B4 2C ..a..1a./(..F8., | |
0010: E1 C6 D9 E2 .... | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 23 3E DF 4B D2 31 42 A5 B6 7E 42 5C 1A 44 CC 69 #>.K.1B...B\.D.i | |
0010: D1 68 B4 5D 4B E0 04 21 6C 4B E2 6D CC B1 E0 97 .h.]K..!lK.m.... | |
0020: 8F A6 53 09 CD AA 2A 65 E5 39 4F 1E 83 A5 6E 5C ..S...*e.9O...n\ | |
0030: 98 A2 24 26 E6 FB A1 ED 93 C7 2E 02 C6 4D 4A BF ..$&.........MJ. | |
0040: B0 42 DF 78 DA B3 A8 F9 6D FF 21 85 53 36 60 4C .B.x....m.!.S6`L | |
0050: 76 CE EC 38 DC D6 51 80 F0 C5 D6 E5 D4 4D 27 64 v..8..Q......M'd | |
0060: AB 9B C7 3E 71 FB 48 97 B8 33 6D C9 13 07 EE 96 ...>q.H..3m..... | |
0070: A2 1B 18 15 F6 5C 4C 40 ED B3 C2 EC FF 71 C1 E3 .....\L@.....q.. | |
0080: 47 FF D4 B9 00 B4 37 42 DA 20 C9 EA 6E 8A EE 14 G.....7B. ..n... | |
0090: 06 AE 7D A2 59 98 88 A8 1B 6F 2D F4 F2 C9 14 5F ....Y....o-...._ | |
00A0: 26 CF 2C 8D 7E ED 37 C0 A9 D5 39 B9 82 BF 19 0C &.,...7...9..... | |
00B0: EA 34 AF 00 21 68 F8 AD 73 E2 C9 32 DA 38 25 0B .4..!h..s..2.8%. | |
00C0: 55 D3 9A 1D F0 68 86 ED 2E 41 34 EF 7C A5 50 1D U....h...A4...P. | |
00D0: BF 3A F9 D3 C1 08 0C E6 ED 1E 8A 58 25 E4 B8 77 .:.........X%..w | |
00E0: AD 2D 6E F5 52 DD B4 74 8F AB 49 2E 9D 3B 93 34 .-n.R..t..I..;.4 | |
00F0: 28 1F 78 CE 94 EA C7 BD D3 C9 6D 1C DE 5C 32 F3 (.x.......m..\2. | |
] | |
*** | |
main, handling exception: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
%% Invalidated: [Session-1, SSL_RSA_WITH_RC4_128_SHA] | |
main, SEND TLSv1 ALERT: fatal, description = internal_error | |
main, WRITE: TLSv1 Alert, length = 2 | |
main, called closeSocket() | |
Exception in thread "main" java.lang.RuntimeException: javax.net.ssl.SSLException: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
at org.gradle.wrapper.ExclusiveFileAccessManager.access(ExclusiveFileAccessManager.java:78) | |
at org.gradle.wrapper.Install.createDist(Install.java:44) | |
at org.gradle.wrapper.WrapperExecutor.execute(WrapperExecutor.java:126) | |
at org.gradle.wrapper.GradleWrapperMain.main(GradleWrapperMain.java:55) | |
Caused by: javax.net.ssl.SSLException: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
at sun.security.ssl.Alerts.getSSLException(Alerts.java:208) | |
at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1937) | |
at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1894) | |
at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1877) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1398) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1375) | |
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:563) | |
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1512) | |
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1440) | |
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254) | |
at org.gradle.wrapper.Download.downloadInternal(Download.java:56) | |
at org.gradle.wrapper.Download.download(Download.java:42) | |
at org.gradle.wrapper.Install$1.call(Install.java:57) | |
at org.gradle.wrapper.Install$1.call(Install.java:44) | |
at org.gradle.wrapper.ExclusiveFileAccessManager.access(ExclusiveFileAccessManager.java:65) | |
... 3 more | |
Caused by: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
at sun.security.validator.PKIXValidator.<init>(PKIXValidator.java:90) | |
at sun.security.validator.Validator.getInstance(Validator.java:179) | |
at sun.security.ssl.X509TrustManagerImpl.getValidator(X509TrustManagerImpl.java:312) | |
at sun.security.ssl.X509TrustManagerImpl.checkTrustedInit(X509TrustManagerImpl.java:171) | |
at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:184) | |
at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:124) | |
at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1460) | |
at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:212) | |
at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) | |
at sun.security.ssl.Handshaker.process_record(Handshaker.java:914) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1050) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1363) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1391) | |
... 14 more | |
Caused by: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty | |
at java.security.cert.PKIXParameters.setTrustAnchors(PKIXParameters.java:200) | |
at java.security.cert.PKIXParameters.<init>(PKIXParameters.java:120) | |
at java.security.cert.PKIXBuilderParameters.<init>(PKIXBuilderParameters.java:104) | |
at sun.security.validator.PKIXValidator.<init>(PKIXValidator.java:88) | |
... 26 more |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment