So soon after examining your class path is appropriate (I actually dump the entire classpath on startup) I then do a binary chop on class A. Not specifically a location but you can override the default TrustManager and HostnameVerifier to accept everything. Not a secure strategy but in your predicament, https://charliejgnve.ambien-blog.com/42978716/the-5-second-trick-for-bongacams-com