Server response to Serverhello and certificate request


Default Executor-thread-14, WRITE: TLSv1.2 Handshake, length = 2660
Wait..... and read the data

Default Executor-thread-34, READ: TLSv1.2 Handshake, length = 1356

If clientAuthentication specified.... do this blue section

This is the certificate sent to the server

*** Certificate chain chain [0] = [ Certificate for CN=SS, O=SSS, C=GB Subject: CN=SS, O=SSS, C=GB Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=SS, O=SSS, C=GB Algorithm: [SHA256withRSA] ] *** Check it in the list of trusted certificates/CA Found trusted certificate: Certificate for CN=SS, O=SSS, C=GB Subject: CN=SS, O=SSS, C=GB Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=SS, O=SSS, C=GB Algorithm: [SHA256withRSA] ] Next is a different thread - 32 Default Executor-thread-32, READ: TLSv1.2 Handshake, length = 70

The Client sent the key value to use
*** ECDHClientKeyExchange
ECDH Public value:  {... }

JsseJCE:  Using KeyFactory EC from provider IBMJCE version 1.8
JsseJCE:  Using KeyFactory EC from provider IBMJCE version 1.8
JsseJCE:  Using KeyAgreement ECDH from provider IBMJCE version 1.8
ECDHCrypt:  ECDH KeyAgreement  from provider from initIBMJCE version 1.8
SESSION KEYGEN:
PreMaster Secret:Data omitted
javax.crypto.spec.SecretKeySpec@5e624290
JsseJCE:  Using KeyGenerator IbmTlsExtendedMasterSecret from provider TBD via init
JsseJCE:  Using KeyGenerator IbmTls12KeyMaterial from provider TBD via init
CONNECTION KEYGEN:
Client Nonce:Data omitted
Server Nonce:Data omitted
Master Secret:Data omitted
Client write key:Data omitted
Server write key:Data omitted
Client write IV:Data omitted
Server write IV:Data omitted
Read more data
Default Executor-thread-32, READ: TLSv1.2 Handshake, length = 520
Validate the certificate using the specified Signature Algorithm
*** CertificateVerify
Signature Algorithm SHA512withRSA
JsseJCE:  Using signature SHA512withRSA from provider TBD via init
Signatures:  Using signature RSA from provider from initVerifyIBMJCE version 1.8
Default Executor-thread-32, READ: TLSv1.2 Change Cipher Spec, length = 1
JsseJCE:  Using cipher AES/GCM/NoPadding from provider TBD via init