Buildfile: build.xml setdefaultmode: [echo] So you are using Platform Edition print-props: [echo] admin.user=admin [echo] admin.port=4848 [echo] admin.domain=domain1 [echo] appserver.instance.name=server setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: [echo] Workaround for early v3: create directories... setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: clean: [delete] Deleting directory /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes [delete] Deleting directory /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive compile: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common-as: [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes [echo] sqe-common.xml: Compiling test source files [javac] Compiling 3 source files to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common-as80: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common-as: [echo] sqe-common.xml: Compiling test source files [javac] Compiling 1 source file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: compile-common-as80: build: setOSConditions: fixFiles: convUnix: [echo] fixed files for Unix convWin: setdefaultmode: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: copy-persistence-descriptors-common: [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF package-par-common: static-weave-par: [echo] sqe-common.xml: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes, /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive [echo] sqe-common.xml: Generating PAR inside build directory [jar] Building jar: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/sec-clientcert-par.jar [delete] Deleting directory /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF ejb-jar-common: package-ejbjar-common: [echo] sqe-common.xml: Generating ejb-jar inside build directory [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF/wsdl [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [jar] Building jar: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/sec-clientcert-ejb.jar [delete] Deleting directory /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF appclient-jar-common: package-appclientjar-common: [echo] sqe-common.xml: Generating appclient-jar in build dir [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [jar] Building jar: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/sec-clientcert-client.jar [delete] Deleting directory /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF webclient-war-common: build-ear-common: [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/lib [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/lib [mkdir] Created dir: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [copy] Copying 1 file to /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/classes/META-INF [jar] Building jar: /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/sec-clientcertApp.ear setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: deploy: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: deploy-common: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: deploy-common-pe: [exec] asadmin --host localhost --port 4848 --user admin --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --interactive=false --echo=true --terse=false deploy --name sec-clientcertApp --force=false --precompilejsp=false --verify=false --retrieve /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive --enabled=true --generatermistubs=false --availabilityenabled=false --keepreposdir=false --keepfailedstubs=false --logReportedErrors=true --help=false /export/sonia/appserver-sqe/build/pe/sparc_jed-asqe-1_SunOS/sec/archive/sec-clientcertApp.ear [exec] Application deployed successfully with name sec-clientcertApp. [exec] [exec] [exec] Command deploy executed successfully. setup: create-sample-jks-cert: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: create-cert-jks: [echo] Create certificate in clientcert.jks ... setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: create-cert-jks: [echo] Create certificate in clientcert.jks ... setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: list-cert-jks: [echo] *** Listing of certificates in clientcert.jks *** [exec] [exec] Keystore type: JKS [exec] Keystore provider: SUN [exec] [exec] Your keystore contains 2 entries [exec] [exec] Alias name: jagadesh [exec] Creation date: Mar 18, 2010 [exec] Entry type: PrivateKeyEntry [exec] Certificate chain length: 1 [exec] Certificate[1]: [exec] Owner: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Issuer: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Serial number: 4ba266db [exec] Valid from: Thu Mar 18 10:46:03 PDT 2010 until: Wed Jun 16 10:46:03 PDT 2010 [exec] Certificate fingerprints: [exec] MD5: BE:90:E8:E1:2D:58:C3:85:82:1D:72:42:73:73:31:06 [exec] SHA1: 42:65:52:BC:39:B4:92:D2:B4:40:03:A6:9B:A4:0C:79:3C:36:B2:EE [exec] Signature algorithm name: SHA1withDSA [exec] Version: 3 [exec] [exec] [exec] ******************************************* [exec] ******************************************* [exec] [exec] [exec] Alias name: clientcert [exec] Creation date: Mar 18, 2010 [exec] Entry type: PrivateKeyEntry [exec] Certificate chain length: 1 [exec] Certificate[1]: [exec] Owner: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Issuer: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Serial number: 4ba266d9 [exec] Valid from: Thu Mar 18 10:46:01 PDT 2010 until: Wed Jun 16 10:46:01 PDT 2010 [exec] Certificate fingerprints: [exec] MD5: E6:DB:31:F0:9D:1B:64:29:BC:A5:08:B7:69:5F:6D:F5 [exec] SHA1: 2E:3E:F9:30:D5:BF:3A:D0:0F:37:73:D5:83:39:13:D4:25:F7:4A:23 [exec] Signature algorithm name: SHA1withDSA [exec] Version: 3 [exec] [exec] [exec] ******************************************* [exec] ******************************************* [exec] [exec] setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: set-appserver-version: est-cert-trust: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: est-cert-trust-pe: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: export-cert-rfc-jks: [echo] Export certificate from clientcert.jks in rfc format ... [exec] Certificate stored in file setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: import-cert-jks: [echo] Installing certificate in /export/sonia/v3/glassfishv3/glassfish/domains/domain1/config/cacerts.jks ... [exec] Certificate was added to keystore setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: est-cert-trust-ee: create-auth-certrealm: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: create-auth-realm: [echo] Creating auth realm certrealmperapp ... [exec] Deprecated syntax, instead use: [exec] asadmin --port 4848 --host localhost --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --echo --user admin --terse=false create-auth-realm [options] ... [exec] asadmin --host localhost --port 4848 --user admin --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --interactive=false --echo=true --terse=false create-auth-realm --classname com.sun.enterprise.security.auth.realm.certificate.CertificateRealm --property assign-groups=group1,group2:jaas-context=certificateRealm --target server --help=false certrealmperapp [exec] [exec] Command create-auth-realm executed successfully. setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: enable-iiop-ssl-client-auth: [echo] Enable ssl client auth for iiop-service ... [exec] Deprecated syntax, instead use: [exec] asadmin --port 4848 --host localhost --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --echo --user admin --terse=false set [options] ... [exec] asadmin --host localhost --port 4848 --user admin --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --interactive=false --echo=true --terse=false set --help=false server.iiop-service.iiop-listener.SSL.ssl.client_auth_enabled=true [exec] server.iiop-service.iiop-listener.SSL.ssl.client-auth-enabled=true [exec] [exec] Command set executed successfully. [exec] Deprecated syntax, instead use: [exec] asadmin --port 4848 --host localhost --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --echo --user admin --terse=false set [options] ... [exec] asadmin --host localhost --port 4848 --user admin --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --interactive=false --echo=true --terse=false set --help=false server.iiop-service.iiop-listener.SSL_MUTUALAUTH.ssl.client_auth_enabled=true [exec] server.iiop-service.iiop-listener.SSL_MUTUALAUTH.ssl.client-auth-enabled=true [exec] [exec] Command set executed successfully. setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: set-client-cert-nickname: [copy] Copying 1 file to /export/sonia/v3/glassfishv3/glassfish/domains/domain1/config [copy] Copying 1 file to /export/sonia/v3/glassfishv3/glassfish/domains/domain1/config restart: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: restart-server-instance-common: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: restart-server-instance-common-pe: [echo] Restarting the AppServer instance... setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: stop-domain: [echo] run.xml:stopping domain... [exec] Waiting for the domain to stop ... [exec] Command stop-domain executed successfully. setdefaultmode: ping-appserver-version: init-password-file: create-password-file: start-domain: start-domain-pe: [echo] start-domain is running on Platform Edition... setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: start-domain-win: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: start-domain-unix: [echo] run.xml:starting domain on a unix OS... [exec] Deprecated syntax, instead use: [exec] asadmin --passwordfile /export/sonia/appserver-sqe/build-config/adminpassword.txt --user admin start-domain [options] ... [exec] Waiting for DAS to start ....................... [exec] Started domain: domain1 [exec] Domain location: /export/sonia/v3/glassfishv3/glassfish/domains/domain1 [exec] Log file: /export/sonia/v3/glassfishv3/glassfish/domains/domain1/logs/server.log [exec] Admin port for the domain: 4848 [exec] Command start-domain executed successfully. start-domain-ee: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: set-appserver-version: run: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: run-pe: [exec] Mar 18, 2010 10:47:22 AM com.sun.enterprise.transaction.JavaEETransactionManagerSimplified initDelegates [exec] INFO: Using com.sun.enterprise.transaction.jts.JavaEETransactionManagerJTSDelegate as the delegate [exec] *** [exec] found key for : jagadesh [exec] chain [0] = [ [exec] [ [exec] Version: V3 [exec] Subject: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 [exec] [exec] Key: SunPKCS11-Solaris DSA public key, 1024 bits (id 13991408, session object) [exec] y: 122030098395212485646937811092947157161080714744226360562747034575519855720397155633862675090941890494378044986839701769630266363049387412802814232507487771232920348933974961789649359931806474846741765294366305695226364634742502560143371008230874562948224707448607968439276528036936605133064690624182297634261 [exec] p: 178011905478542266528237562450159990145232156369120674273274450314442865788737020770612695252123463079567156784778466449970650770920727857050009668388144034129745221171818506047231150039301079959358067395348717066319802262019714966524135060945913707594956514672855690606794135837542707371727429551343320695239 [exec] q: 864205495604807476120572616017955259175325408501 [exec] g: 174068207532402095185811980123523436538604490794561350978495831040599953488455823147851597408940950725307797094915759492368300574252438761037084473467180148876118103083043754985190983472601550494691329488083395492313850000361646482644608492304078721818959999056496097769368017749273708962006689187956744210730 [exec] Validity: [From: Thu Mar 18 10:46:03 PDT 2010, [exec] To: Wed Jun 16 10:46:03 PDT 2010] [exec] Issuer: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] SerialNumber: [ 4ba266db] [exec] [exec] ] [exec] Algorithm: [SHA1withDSA] [exec] Signature: [exec] 0000: 30 2D 02 15 00 8F 1E 57 30 56 12 C1 5C 74 23 4E 0-.....W0V..\t#N [exec] 0010: FC 9B C8 64 69 4D 9F A2 16 02 14 60 84 37 68 8F ...diM.....`.7h. [exec] 0020: 2B 31 A8 CD 84 2E 84 F6 49 2F B6 AC 3A D1 44 +1......I/..:.D [exec] [exec] ] [exec] *** [exec] *** [exec] found key for : clientcert [exec] chain [0] = [ [exec] [ [exec] Version: V3 [exec] Subject: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 [exec] [exec] Key: SunPKCS11-Solaris DSA public key, 1024 bits (id 14164600, session object) [exec] y: 157337716995569966824008711850975980497228854650069725371308392673248367564246727289032991934548399859113595578441509744568134358924068227063677020457586788616113643838544221129779647865156437975633414780581698165268330202070736000144107287532798427098120122692367904181692600565091214736704609694269518855200 [exec] p: 178011905478542266528237562450159990145232156369120674273274450314442865788737020770612695252123463079567156784778466449970650770920727857050009668388144034129745221171818506047231150039301079959358067395348717066319802262019714966524135060945913707594956514672855690606794135837542707371727429551343320695239 [exec] q: 864205495604807476120572616017955259175325408501 [exec] g: 174068207532402095185811980123523436538604490794561350978495831040599953488455823147851597408940950725307797094915759492368300574252438761037084473467180148876118103083043754985190983472601550494691329488083395492313850000361646482644608492304078721818959999056496097769368017749273708962006689187956744210730 [exec] Validity: [From: Thu Mar 18 10:46:01 PDT 2010, [exec] To: Wed Jun 16 10:46:01 PDT 2010] [exec] Issuer: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] SerialNumber: [ 4ba266d9] [exec] [exec] ] [exec] Algorithm: [SHA1withDSA] [exec] Signature: [exec] 0000: 30 2C 02 14 1B 36 3F 19 09 5D D4 9F 5B D8 B6 94 0,...6?..]..[... [exec] 0010: 3D 8F 46 34 5C D3 3E 79 02 14 74 3E 63 21 AF 21 =.F4\.>y..t>c!.! [exec] 0020: A6 77 CC F6 A7 50 94 B4 03 91 EB 6F E8 56 .w...P.....o.V [exec] [exec] ] [exec] *** [exec] adding as trusted cert: [exec] Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US [exec] Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US [exec] Algorithm: RSA; Serial number: 0x35def4cf [exec] Valid from Sat Aug 22 09:41:51 PDT 1998 until Wed Aug 22 09:41:51 PDT 2018 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US [exec] Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x0 [exec] Valid from Tue Jun 29 10:39:16 PDT 2004 until Thu Jun 29 10:39:16 PDT 2034 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US [exec] Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US [exec] Algorithm: RSA; Serial number: 0x4 [exec] Valid from Sun Jun 20 21:00:00 PDT 1999 until Sat Jun 20 21:00:00 PDT 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x6170cb498c5f984529e7b0a6d9505b7a [exec] Valid from Thu Sep 30 17:00:00 PDT 1999 until Wed Jul 16 16:59:59 PDT 2036 [exec] [exec] adding as trusted cert: [exec] Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x4cc7eaaa983e71d39310f83d3a899192 [exec] Valid from Sun May 17 17:00:00 PDT 1998 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Issuer: EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Algorithm: RSA; Serial number: 0x0 [exec] Valid from Sun Dec 31 16:00:00 PST 1995 until Thu Dec 31 15:59:59 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA [exec] Issuer: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA [exec] Algorithm: RSA; Serial number: 0x1 [exec] Valid from Wed Jul 31 17:00:00 PDT 1996 until Thu Dec 31 15:59:59 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6 [exec] Valid from Sun May 17 17:00:00 PDT 1998 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Issuer: EMAILADDRESS=jagadesh.munta@sun.com, CN=Jagadesh Munta, UID=munta, OU=Java Software, O=Sun Microsystems Inc, C=US [exec] Algorithm: DSA; Serial number: 0x4ba266d9 [exec] Valid from Thu Mar 18 10:46:01 PDT 2010 until Wed Jun 16 10:46:01 PDT 2010 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US [exec] Issuer: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US [exec] Algorithm: RSA; Serial number: 0x3770cfb5 [exec] Valid from Wed Jun 23 05:14:45 PDT 1999 until Sun Jun 23 05:14:45 PDT 2019 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US [exec] Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US [exec] Algorithm: RSA; Serial number: 0x1 [exec] Valid from Sun Jun 20 21:00:00 PDT 1999 until Sat Jun 20 21:00:00 PDT 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net [exec] Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref. (limits liab.), O=Entrust.net [exec] Algorithm: RSA; Serial number: 0x389b113c [exec] Valid from Fri Feb 04 09:20:00 PST 2000 until Tue Feb 04 09:50:00 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US [exec] Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US [exec] Algorithm: RSA; Serial number: 0x1a5 [exec] Valid from Wed Aug 12 17:29:00 PDT 1998 until Mon Aug 13 16:59:00 PDT 2018 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Issuer: EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Algorithm: RSA; Serial number: 0x0 [exec] Valid from Sun Dec 31 16:00:00 PST 1995 until Thu Dec 31 15:59:59 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE [exec] Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE [exec] Algorithm: RSA; Serial number: 0x20000b9 [exec] Valid from Fri May 12 11:46:00 PDT 2000 until Mon May 12 16:59:00 PDT 2025 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Issuer: EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA [exec] Algorithm: RSA; Serial number: 0x0 [exec] Valid from Sun Dec 31 16:00:00 PST 1995 until Thu Dec 31 15:59:59 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net [exec] Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 2000 Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits liab.), O=Entrust.net [exec] Algorithm: RSA; Serial number: 0x389ef6e4 [exec] Valid from Mon Feb 07 08:16:40 PST 2000 until Fri Feb 07 08:46:40 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US [exec] Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US [exec] Algorithm: RSA; Serial number: 0x23456 [exec] Valid from Mon May 20 21:00:00 PDT 2002 until Fri May 20 21:00:00 PDT 2022 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x70bae41d10d92934b638ca7b03ccbabf [exec] Valid from Sun Jan 28 16:00:00 PST 1996 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0xcdba7f56f0dfe4bc54fe22acb372aa55 [exec] Valid from Sun Jan 28 16:00:00 PST 1996 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US [exec] Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x0 [exec] Valid from Tue Jun 29 10:06:20 PDT 2004 until Thu Jun 29 10:06:20 PDT 2034 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE [exec] Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE [exec] Algorithm: RSA; Serial number: 0x20000bf [exec] Valid from Wed May 17 07:01:00 PDT 2000 until Sat May 17 16:59:00 PDT 2025 [exec] [exec] adding as trusted cert: [exec] Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x8b5b75568454850b00cfaf3848ceb1a4 [exec] Valid from Thu Sep 30 17:00:00 PDT 1999 until Wed Jul 16 16:59:59 PDT 2036 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Sun Microsystems Inc SSL CA, OU=Class 3 MPKI Secure Server CA, OU=VeriSign Trust Network, O=Sun Microsystems Inc [exec] Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x4fa130037f5dfd643fb367fbaf699e7c [exec] Valid from Wed Jun 01 17:00:00 PDT 2005 until Mon Jun 01 16:59:59 PDT 2015 [exec] [exec] adding as trusted cert: [exec] Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0xb92f60cc889fa17a4609b85b706c8aaf [exec] Valid from Sun May 17 17:00:00 PDT 1998 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: CN=localhost, OU=GlassFish, O=Sun Microsystems, L=Santa Clara, ST=California, C=US [exec] Issuer: CN=localhost, OU=GlassFish, O=Sun Microsystems, L=Santa Clara, ST=California, C=US [exec] Algorithm: RSA; Serial number: 0x4ba09760 [exec] Valid from Wed Mar 17 01:48:32 PDT 2010 until Sat Mar 14 01:48:32 PDT 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net [exec] Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net [exec] Algorithm: RSA; Serial number: 0x3863b966 [exec] Valid from Fri Dec 24 09:50:51 PST 1999 until Tue Dec 24 10:20:51 PST 2019 [exec] [exec] adding as trusted cert: [exec] Subject: OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Issuer: OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x2d1bfc4a178da391ebe7fff58b45be0b [exec] Valid from Sun Jan 28 16:00:00 PST 1996 until Tue Aug 01 16:59:59 PDT 2028 [exec] [exec] adding as trusted cert: [exec] Subject: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US [exec] Issuer: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US [exec] Algorithm: RSA; Serial number: 0x1b6 [exec] Valid from Fri Aug 14 07:50:00 PDT 1998 until Wed Aug 14 16:59:00 PDT 2013 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE [exec] Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE [exec] Algorithm: RSA; Serial number: 0x26 [exec] Valid from Fri Jul 09 05:11:00 PDT 1999 until Tue Jul 09 16:59:00 PDT 2019 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US [exec] Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), O=Entrust.net, C=US [exec] Algorithm: RSA; Serial number: 0x374ad243 [exec] Valid from Tue May 25 09:09:40 PDT 1999 until Sat May 25 09:39:40 PDT 2019 [exec] [exec] adding as trusted cert: [exec] Subject: CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US [exec] Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by ref. limits liab., O=Entrust.net, C=US [exec] Algorithm: RSA; Serial number: 0x380391ee [exec] Valid from Tue Oct 12 12:24:30 PDT 1999 until Sat Oct 12 12:54:30 PDT 2019 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA [exec] Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA [exec] Algorithm: RSA; Serial number: 0x1 [exec] Valid from Wed Jul 31 17:00:00 PDT 1996 until Thu Dec 31 15:59:59 PST 2020 [exec] [exec] adding as trusted cert: [exec] Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US [exec] Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57 [exec] Valid from Thu Sep 30 17:00:00 PDT 1999 until Wed Jul 16 16:59:59 PDT 2036 [exec] [exec] adding as trusted cert: [exec] Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network [exec] Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network [exec] Algorithm: RSA; Serial number: 0x1 [exec] Valid from Fri Jun 25 17:19:54 PDT 1999 until Tue Jun 25 17:19:54 PDT 2019 [exec] [exec] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use [exec] trigger seeding of SecureRandom [exec] done seeding SecureRandom [exec] WS HOME appserver-sqe [exec] **************************************************************** [exec] * Client side certificate nickname slection during client cert testing * [exec] **************************************************************** [exec] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use [exec] trigger seeding of SecureRandom [exec] done seeding SecureRandom [exec] %% No cached client session [exec] *** ClientHello, TLSv1 [exec] RandomCookie: GMT: 1252157240 bytes = { 4, 12, 72, 81, 255, 132, 63, 11, 6, 57, 194, 44, 138, 22, 50, 98, 164, 240, 243, 147, 29, 216, 49, 56, 17, 187, 133, 238 } [exec] Session ID: {} [exec] Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA] [exec] Compression Methods: { 0 } [exec] *** [exec] p: default-threadpool; w: 1, WRITE: TLSv1 Handshake, length = 73 [exec] p: default-threadpool; w: 1, WRITE: SSLv2 client hello message, length = 98 [exec] p: default-threadpool; w: 1, handling exception: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? [exec] p: default-threadpool; w: 1, SEND TLSv1 ALERT: fatal, description = unexpected_message [exec] p: default-threadpool; w: 1, WRITE: TLSv1 Alert, length = 2 [exec] p: default-threadpool; w: 1, called closeSocket() [exec] main, handling exception: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? [exec] main, called close() [exec] main, called closeInternal(true) [exec] org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe [exec] at com.sun.corba.ee.impl.logging.ORBUtilSystemException.writeErrorSend(ORBUtilSystemException.java:3462) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.sendWithoutLock(SocketOrChannelConnectionImpl.java:1127) [exec] at com.sun.corba.ee.impl.encoding.BufferManagerWriteStream.sendFragment(BufferManagerWriteStream.java:148) [exec] at com.sun.corba.ee.impl.encoding.BufferManagerWriteStream.sendMessage(BufferManagerWriteStream.java:162) [exec] at com.sun.corba.ee.impl.encoding.CDROutputObject.finishSendingMessage(CDROutputObject.java:180) [exec] at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.finishSendingRequest(CorbaMessageMediatorImpl.java:276) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.marshalingComplete1(CorbaClientRequestDispatcherImpl.java:392) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.marshalingComplete(CorbaClientRequestDispatcherImpl.java:364) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientDelegateImpl.invoke(CorbaClientDelegateImpl.java:235) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientDelegateImpl.is_a(CorbaClientDelegateImpl.java:354) [exec] at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:112) [exec] at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:69) [exec] at com.sun.enterprise.naming.impl.SerialContext.narrowProvider(SerialContext.java:355) [exec] at com.sun.enterprise.naming.impl.SerialContext.getRemoteProvider(SerialContext.java:327) [exec] at com.sun.enterprise.naming.impl.SerialContext.getProvider(SerialContext.java:271) [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:430) [exec] at javax.naming.InitialContext.lookup(InitialContext.java:392) [exec] at com.sun.ejb.EjbNamingReferenceManagerImpl.resolveEjbReference(EjbNamingReferenceManagerImpl.java:169) [exec] at com.sun.enterprise.container.common.impl.ComponentEnvManagerImpl$EjbReferenceProxy.create(ComponentEnvManagerImpl.java:1040) [exec] at com.sun.enterprise.naming.impl.GlassfishNamingManagerImpl.lookup(GlassfishNamingManagerImpl.java:688) [exec] at com.sun.enterprise.naming.impl.GlassfishNamingManagerImpl.lookup(GlassfishNamingManagerImpl.java:657) [exec] at com.sun.enterprise.naming.impl.JavaURLContext.lookup(JavaURLContext.java:148) [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:428) [exec] at javax.naming.InitialContext.lookup(InitialContext.java:392) [exec] at com.sun.s1peqe.security.realmperapp.RealmPerAppTestClient.doTests(RealmPerAppTestClient.java:56) [exec] at com.sun.s1peqe.security.realmperapp.RealmPerAppTestClient.main(RealmPerAppTestClient.java:37) [exec] at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) [exec] at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) [exec] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) [exec] at java.lang.reflect.Method.invoke(Method.java:597) [exec] at org.glassfish.appclient.client.acc.AppClientContainer.launch(AppClientContainer.java:424) [exec] at org.glassfish.appclient.client.AppClientFacade.launch(AppClientFacade.java:151) [exec] at org.glassfish.appclient.client.AppClientGroupFacade.main(AppClientGroupFacade.java:64) [exec] Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? [exec] at com.sun.net.ssl.internal.ssl.InputRecord.handleUnknownRecord(InputRecord.java:523) [exec] at com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:355) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:789) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1112) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readDataRecord(SSLSocketImpl.java:744) [exec] at com.sun.net.ssl.internal.ssl.AppInputStream.read(AppInputStream.java:75) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.readFully(SocketOrChannelConnectionImpl.java:653) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.read(SocketOrChannelConnectionImpl.java:477) [exec] at com.sun.corba.ee.impl.protocol.giopmsgheaders.MessageBase.readGIOPHeader(MessageBase.java:133) [exec] at com.sun.corba.ee.impl.protocol.giopmsgheaders.MessageBase.readGIOPMessage(MessageBase.java:121) [exec] at com.sun.corba.ee.impl.transport.CorbaContactInfoBase.createMessageMediator(CorbaContactInfoBase.java:150) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.readBits(SocketOrChannelConnectionImpl.java:374) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.read(SocketOrChannelConnectionImpl.java:341) [exec] at com.sun.corba.ee.impl.transport.ReaderThreadImpl.doWork(ReaderThreadImpl.java:118) [exec] at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.performWork(ThreadPoolImpl.java:492) [exec] at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.run(ThreadPoolImpl.java:528) [exec] Got Exception!!! All tests marked as failed! [exec] javax.naming.NamingException: Lookup failed for 'java:comp/env/ejb/SecAuthTestBean' in SerialContext targetHost=localhost,targetPort=3700 [Root exception is javax.naming.NamingException: Exception resolving Ejb for 'Remote ejb-ref name=ejb/SecAuthTestBean,Remote 2.x home =com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome,Remote 2.x component interface=com.sun.s1peqe.security.realmperapp.SecAuthTestRemote,ejb-link=SecAuthTestBean,lookup=null,mappedName=,jndi-name=java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome,refType=Session' . Actual (possibly internal) Remote JNDI name used for lookup is 'java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome' [Root exception is javax.naming.NamingException: Lookup failed for 'java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome' in SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is javax.naming.NamingException: Unable to acquire SerialContextProvider for SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe]]]] [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:442) [exec] at javax.naming.InitialContext.lookup(InitialContext.java:392) [exec] at com.sun.s1peqe.security.realmperapp.RealmPerAppTestClient.doTests(RealmPerAppTestClient.java:56) [exec] at com.sun.s1peqe.security.realmperapp.RealmPerAppTestClient.main(RealmPerAppTestClient.java:37) [exec] at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) [exec] at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) [exec] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) [exec] at java.lang.reflect.Method.invoke(Method.java:597) [exec] at org.glassfish.appclient.client.acc.AppClientContainer.launch(AppClientContainer.java:424) [exec] at org.glassfish.appclient.client.AppClientFacade.launch(AppClientFacade.java:151) [exec] at org.glassfish.appclient.client.AppClientGroupFacade.main(AppClientGroupFacade.java:64) [exec] Caused by: javax.naming.NamingException: Exception resolving Ejb for 'Remote ejb-ref name=ejb/SecAuthTestBean,Remote 2.x home =com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome,Remote 2.x component interface=com.sun.s1peqe.security.realmperapp.SecAuthTestRemote,ejb-link=SecAuthTestBean,lookup=null,mappedName=,jndi-name=java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome,refType=Session' . Actual (possibly internal) Remote JNDI name used for lookup is 'java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome' [Root exception is javax.naming.NamingException: Lookup failed for 'java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome' in SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is javax.naming.NamingException: Unable to acquire SerialContextProvider for SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe]]] [exec] at com.sun.ejb.EjbNamingReferenceManagerImpl.resolveEjbReference(EjbNamingReferenceManagerImpl.java:174) [exec] at com.sun.enterprise.container.common.impl.ComponentEnvManagerImpl$EjbReferenceProxy.create(ComponentEnvManagerImpl.java:1040) [exec] at com.sun.enterprise.naming.impl.GlassfishNamingManagerImpl.lookup(GlassfishNamingManagerImpl.java:688) [exec] at com.sun.enterprise.naming.impl.GlassfishNamingManagerImpl.lookup(GlassfishNamingManagerImpl.java:657) [exec] at com.sun.enterprise.naming.impl.JavaURLContext.lookup(JavaURLContext.java:148) [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:428) [exec] ... 10 more [exec] Caused by: javax.naming.NamingException: Lookup failed for 'java:global/sec-clientcertApp/sec-clientcert-ejb/SecAuthTestBean!com.sun.s1peqe.security.realmperapp.SecAuthTestRemoteHome' in SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is javax.naming.NamingException: Unable to acquire SerialContextProvider for SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe]] [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:442) [exec] at javax.naming.InitialContext.lookup(InitialContext.java:392) [exec] at com.sun.ejb.EjbNamingReferenceManagerImpl.resolveEjbReference(EjbNamingReferenceManagerImpl.java:169) [exec] ... 15 more [exec] Caused by: javax.naming.NamingException: Unable to acquire SerialContextProvider for SerialContext targetHost=localhost,targetPort=3700,orb'sInitialHost=localhost,orb'sInitialPort=3700 [Root exception is org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe] [exec] at com.sun.enterprise.naming.impl.SerialContext.getProvider(SerialContext.java:276) [exec] at com.sun.enterprise.naming.impl.SerialContext.lookup(SerialContext.java:430) [exec] ... 17 more [exec] Caused by: org.omg.CORBA.COMM_FAILURE: vmcid: SUN minor code: 203 completed: Maybe [exec] at com.sun.corba.ee.impl.logging.ORBUtilSystemException.writeErrorSend(ORBUtilSystemException.java:3462) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.sendWithoutLock(SocketOrChannelConnectionImpl.java:1127) [exec] at com.sun.corba.ee.impl.encoding.BufferManagerWriteStream.sendFragment(BufferManagerWriteStream.java:148) [exec] at com.sun.corba.ee.impl.encoding.BufferManagerWriteStream.sendMessage(BufferManagerWriteStream.java:162) [exec] at com.sun.corba.ee.impl.encoding.CDROutputObject.finishSendingMessage(CDROutputObject.java:180) [exec] at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.finishSendingRequest(CorbaMessageMediatorImpl.java:276) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.marshalingComplete1(CorbaClientRequestDispatcherImpl.java:392) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.marshalingComplete(CorbaClientRequestDispatcherImpl.java:364) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientDelegateImpl.invoke(CorbaClientDelegateImpl.java:235) [exec] at com.sun.corba.ee.impl.protocol.CorbaClientDelegateImpl.is_a(CorbaClientDelegateImpl.java:354) [exec] at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:112) [exec] at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:69) [exec] at com.sun.enterprise.naming.impl.SerialContext.narrowProvider(SerialContext.java:355) [exec] at com.sun.enterprise.naming.impl.SerialContext.getRemoteProvider(SerialContext.java:327) [exec] at com.sun.enterprise.naming.impl.SerialContext.getProvider(SerialContext.java:271) [exec] ... 18 more [exec] Caused by: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? [exec] at com.sun.net.ssl.internal.ssl.InputRecord.handleUnknownRecord(InputRecord.java:523) [exec] at com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:355) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:789) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1112) [exec] at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readDataRecord(SSLSocketImpl.java:744) [exec] at com.sun.net.ssl.internal.ssl.AppInputStream.read(AppInputStream.java:75) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.readFully(SocketOrChannelConnectionImpl.java:653) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.read(SocketOrChannelConnectionImpl.java:477) [exec] at com.sun.corba.ee.impl.protocol.giopmsgheaders.MessageBase.readGIOPHeader(MessageBase.java:133) [exec] at com.sun.corba.ee.impl.protocol.giopmsgheaders.MessageBase.readGIOPMessage(MessageBase.java:121) [exec] at com.sun.corba.ee.impl.transport.CorbaContactInfoBase.createMessageMediator(CorbaContactInfoBase.java:150) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.readBits(SocketOrChannelConnectionImpl.java:374) [exec] at com.sun.corba.ee.impl.transport.SocketOrChannelConnectionImpl.read(SocketOrChannelConnectionImpl.java:341) [exec] at com.sun.corba.ee.impl.transport.ReaderThreadImpl.doWork(ReaderThreadImpl.java:118) [exec] at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.performWork(ThreadPoolImpl.java:492) [exec] at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.run(ThreadPoolImpl.java:528) [exec] Generating report at /export/sonia/appserver-sqe/test_results.xml [exec] [exec] [exec] ----------------------------------------- [exec] - CLIENT-CERT-nickname-Test2-iscaller-expected: FAIL - [exec] - CLIENT-CERT-nickname-Test3-authorized-method: FAIL - [exec] - CLIENT-CERT-nickname-Test1-iscaller-in-role: FAIL - [exec] - CLIENT-CERT-nickname-Test4-unauthorized-method: FAIL - [exec] ----------------------------------------- [exec] Total PASS: 0 [exec] Total FAIL: 4 [exec] Total DNR: 0 [exec] ----------------------------------------- checkReporting-common: confirmReportPresent-common: [echo] Test seems to be reported fine confirmMissingReport-common: setdefaultmode: setOSConditions: setToolWin: setToolUnix: setToolProperty: setS1ASclassPath: setS1AS80classPath: setS1WSclassPath: setJWSDPclassPath: setTimeStamp: init-password-file: init-common: init-password-file: create-password-file: create-report-dir: run-ee: BUILD SUCCESSFUL Total time: 2 minutes 13 seconds