[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: FW: Help with new method?



   Hi Alvin,
   I just browsed your debug file an noticed that after
   the error 500: is a CRLF (that why it says 13 char).
   Try to get the result into a file instead with http_post_url
   so you can se what they actual are sending, they are probably
   sending:
   Internal Error 500 

   The server encountered an unexpected condition which prevented it from
   fulfilling the request.

   Regards

   Henrik

   "Alvin Strasburger" <alvins@xxxxxxxxxxxxx>
   Sent by: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx

   07-05-2010 05:42

                             Please respond to
        HTTPAPI and FTPAPI Projects <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>

                                                                       To

   <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>

                                                                       cc

                                                                  Subject

   FW: Help with new method?

   Spent a good bit of time with this today, but new we keep getting a
   "junk
   after document element".  Most of the time that is all that is in the
   debug
   file, but after starting a new session, I finally got a file complete
   debug
   to attach.  Below is the code that we are running.
   Can someone help us with what's wrong here?
   Thanks,
   Alvin
   /free
    begsr getpasswd;
      rc = http_getauth(basic: digest: realm);
      if rc < 0;
        msg = HTTP_ERROR;
        dsply msg;
        return;
      endif;
     userid = 'enter user id for' + realm;
     dsply userid;
     pass = 'enter passwd for ' + realm;
     dsply pass;
     if Digest;
       callp http_setauth(HTTP_AUTH_MD5_DIGEST:
                        userid: pass);
     else;
       callp http_setauth(HTTP_AUTH_BASIC:
                        userid: pass);
     endif;
     rc = http_post_xml(URL
                        : %addr(Data) + 2
                        : %len(Data)
                        : %paddr(StartOfElement)
                        : %paddr(EndOfElement)
                         : *NULL );
       if        rc <> 1;
         eval      msg = HTTP_ERROR;
         dsply                   msg;
         return;
       endif;
     endsr;
   /end-free
   -----Original Message-----
   From: Alvin Strasburger [mailto:alvins@xxxxxxxxxxxxx]
   Sent: Wednesday, May 05, 2010 3:46 PM
   To: HTTPAPI and FTPAPI Projects
   Subject: RE: Help with new method?
   Mike:
   We already have eight HTTPAPI applications either in testing or
   production.
   Some are REST, some SOAP and some use the WEBFORM tool to add the
   parameters
   to the URL.  They are all parsing the XML replies for us.  So we
   understand
   how to make that part work even though we don't really understand what
   goes
   on under the covers.  All of these applications accept the USERID and
   PW
   either within the XML or as part of the WEBFORM portion of the URL.
   The
   difference with Con-Way is that they require a login first.  This is
   where
   our lack of HTTP knowledge comes into play.
   Do we basically combine the Example of supplying user/pass to HTTP
   server
   (old example 7) with say the UPS tracking example?  (ie. http_getauth
   followed by the http_url_post_xml)?
   Sorry to be o bother, but we have been researching and studying the
   code for
   some time now and know just enough to understand how much knowledge we
   really lack.
   Alvin
   -----Original Message-----
   From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx
   [mailto:ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx]On Behalf Of Mike Krebs
   Sent: Wednesday, May 05, 2010 1:40 PM
   To: HTTPAPI and FTPAPI Projects
   Subject: RE: Help with new method?
   Alvin,
   Take a look at EXAMPLE14. Without seeing the documentation for the
   Con-way
   service, it is hard to know exactly.
   EXAMPLE14 "posts" XML and parses it "interactively". So, assuming the
   con-way service calls for you to send some XML (post), receive some
   XML, and
   you want to parse the XML immediately, this is a good example. You
   will have
   to add the authentication from EXAMPLE7 or from Thomas' example code.
   If you look at EXAMPLE14, you will find a http_url_post_xml at 130.
   This is
   sending the XML data in the postData variable. When the response comes
   back,
   the StartOfElement and EndOfElement procedures are invoked for the
   start of
   each xml element and the end of each xml element. Again, without
   understanding what Con-way wants or what your specific requirements
   are, we
   have a hard time helping you.
   Besides the authentication, yes, it is one statement to send and
   receive
   XML.
   Mike Krebs
   > -----Original Message-----
   > From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx [mailto:ftpapi-
   > bounces@xxxxxxxxxxxxxxxxxxxxxx] On Behalf Of Alvin Strasburger
   > Sent: Wednesday, May 05, 2010 8:54 AM
   > To: HTTPAPI and FTPAPI Projects
   > Subject: RE: Help with new method?
   >
   > Thomas,
   > Thanks for the simple explanation of the FALSE parm.  You are
   correct
   > that
   > this example code is VBScript.  However, rather than from shipwire,
   > this is
   > a nearly identical example from the Con-way Freight Rating tools.
   > Examples
   > are also available in Cold Fusion, Java, JSP, Perl, PHP and a few
   > others.
   >
   > I'm still a bit hazy regarding exactly which functions (procedures)
   to
   > call
   > from HTTPAPI.  From using Example7 to get a successful login, it
   > appears
   > that we must begin with http_setauth.  We are unsure exactly which
   > method(s)
   > to use after that.  We do want to parse the XML reply.  Can you
   suggest
   > which modules to call or which HTTPAPI example program best
   > demonstrates the
   > necessary steps to interact with this company's offering?
   >
   > Alvin
   > Alvin Strasburger
   > Printgear Sportswear
   > Phone    803-744-2310
   > Toll Free 800-763-7763
   > mailto:alvins@xxxxxxxxxxxxx
   > www.printgear.com
   >
   > -----Original Message-----
   > From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx
   > [mailto:ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx]On Behalf Of
   > thomas.raddatz@xxxxxx
   > Sent: Wednesday, May 05, 2010 2:27 AM
   > To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx
   > Subject: Re: Help with new method?
   >
   >
   > Alvin and Scott,
   >
   > I assume that the programming language of the example code is
   VBScript
   > and
   > the the complete example is taken from here:
   >
   >    http://www.shipwire.com/exec/XML_Order_ASP_sample_code.htm
   >
   > A description of the "open" methof of "ServerXMLHTTP" can be found
   > here:
   >
   >    http://msdn.microsoft.com/en-us/library/ms763809%28VS.85%29.aspx
   >
   > Regading to that description the "false" indicates a synchronous
   call
   > which is exactly what HTTP API does.
   >
   > <quote>
   > bAsync(optional)
   >    Boolean. Indicator as to whether the call is asynchronous.
   >    The default is False (the call does not return immediately).
   > </quote>
   >
   > Thomas.
   >
   >
   > ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx schrieb am 05.05.2010
   06:59:46:
   >
   > > Von:
   > >
   > > sk@xxxxxxxxxxxxxxxx
   > >
   > > An:
   > >
   > > ftpapi@xxxxxxxxxxxxxxxxxxxxxx
   > >
   > > Datum:
   > >
   > > 05.05.2010 07:04
   > >
   > > Betreff:
   > >
   > > Re: Help with new method?
   > >
   > > Gesendet von:
   > >
   > > ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx
   > >
   > > Hi Alvin,
   > >
   > > Which programming language was that code written in?  I don't
   > recognize
   > > the syntax.  You'll need to look up the parameters for the 'open'
   > method
   >
   > > of the "Microsoft.XMLHTTP" class in whatever programming language
   > that
   > > is...  this'll tell you what 'false' does.
   > >
   > > Good luck!
   > >
   > >
   > > Alvin Strasburger wrote:
   > > >    We have now been successful with posting XML and SOAP
   requests
   > and
   > > >    parsing the replies as well as using the WEBFORMS tool to
   send
   > simple
   > > >    strings.  We have tried to learn as much as we could in the
   > process.
   > > >    Unfortunately, we have much more knowledge about RPG
   programming
   > and
   > > >    business logic than we have about web programming.
   > > >
   > > >
   > > >     We are in the final stages of integrating freight rating
   into
   > our
   > > >    order entry system and do not quite understand what is
   required
   > for
   > > >    one specific carrier's system.  We have found the following
   > excerpt
   > > >    from an example in their documentation and help translating
   it
   > to
   > the
   > > >    "HTTPAPI language".
   > > >
   > > >
   > > > set httpConn = Server.CreateObject("Microsoft.XMLHTTP")
   > > > 'or alternately depending on what is installed on your server:
   > > > 'set httpConn = Server.CreateObject("MSXML2.ServerXMLHTTP")
   > > > 'or whatever parser you have installed
   > > >
   > > > ' open synchronous connection to X-ShipmentStatus
   > > > httpConn.open "POST",xxxxxxXmlUrl,false,username,password
   > > >
   > > >
   > > > 'set post data type, and post data
   > > > httpConn.setRequestHeader
   "Content-type","application/x-www-form-
   > > urlencoded"
   > > > httpConn.Send requestType & "=" & xmlRequest
   > > >
   > > >
   > > >    We know that xxxxxXmlUrl is a constant containing the URL and
   > that
   > > >    xmlRequest is a constant containing the XML of our request.
   We
   > also
   > > >    know the ID and Password.  We also know that we need to send
   the
   > ID
   > > >    and PW first in order to log in.  We are not sure what the
   > parameter
   > > >    false is for.  It is not documented as a constant.
   > > >
   > > >
   > > >    Can someone help us by listing the specific functions we need
   to
   > call
   > > >    and in what order?
   > > >
   > > >
   > > >    Thanks,
   > > >
   > > >    Alvin
   > > >
   > > >    Alvin Strasburger
   > > >
   > > >    Printgear Sportswear
   > > >
   > > >    Phone    803-744-2310
   > > >
   > > >    Toll Free 800-763-7763
   > > >
   > > >    [1]mailto:alvins@xxxxxxxxxxxxx
   > > >
   > > >    [2]www.printgear.com
   > > >
   > > > References
   > > >
   > > >    1. mailto:alvins@xxxxxxxxxxxxx
   > > >    2. http://www.printgear.com/
   > > >
   > > >
   > > >
   > > >
   >
   ----------------------------------------------------------------------
   -
   > -
   > > >
   > > >
   >
   ----------------------------------------------------------------------
   -
   > > > This is the FTPAPI mailing list.  To unsubscribe, please go to:
   > > > http://www.scottklement.com/mailman/listinfo/ftpapi
   > > >
   >
   ----------------------------------------------------------------------
   -
   > >
   > >
   ---------------------------------------------------------------------
   > --
   > > This is the FTPAPI mailing list.  To unsubscribe, please go to:
   > > http://www.scottklement.com/mailman/listinfo/ftpapi
   > >
   ---------------------------------------------------------------------
   > --
   > >
   >
   >
   > --
   > IMPORTANT NOTICE:
   > This email is confidential, may be legally privileged, and is for
   the
   > intended recipient only. Access, disclosure, copying, distribution,
   or
   > reliance on any of it by anyone else is prohibited and may be a
   > criminal
   > offence. Please delete if obtained in error and email confirmation
   to
   > the
   > sender.
   >
   ----------------------------------------------------------------------
   -
   > This is the FTPAPI mailing list.  To unsubscribe, please go to:
   > http://www.scottklement.com/mailman/listinfo/ftpapi
   >
   ----------------------------------------------------------------------
   -
   >
   > No virus found in this incoming message.
   > Checked by AVG - www.avg.com
   > Version: 9.0.814 / Virus Database: 271.1.1/2854 - Release Date:
   > 05/04/10
   > 14:27:00
   >
   >
   ----------------------------------------------------------------------
   -
   > This is the FTPAPI mailing list.  To unsubscribe, please go to:
   > http://www.scottklement.com/mailman/listinfo/ftpapi
   >
   ----------------------------------------------------------------------
   -
   ----------------------------------------------------------------------
   -
   This is the FTPAPI mailing list.  To unsubscribe, please go to:
   http://www.scottklement.com/mailman/listinfo/ftpapi
   ----------------------------------------------------------------------
   -
   No virus found in this incoming message.
   Checked by AVG - www.avg.com
   Version: 9.0.814 / Virus Database: 271.1.1/2854 - Release Date:
   05/05/10
   02:26:00
   ----------------------------------------------------------------------
   -
   This is the FTPAPI mailing list.  To unsubscribe, please go to:
   http://www.scottklement.com/mailman/listinfo/ftpapi
   ----------------------------------------------------------------------
   -
HTTPAPI Ver 1.21pre5 released 2007-08-29

New iconv() objects set, PostRem=819. PostLoc=0. ProtRem=819. ProtLoc=0
http_url_get(): entered
http_persist_open(): entered
http_long_ParseURL(): entered
https_init(): entered
-------------------------------------------------------------------------------------
Dump of local-side certificate information:
-------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------
Dump of server-side certificate information:
-------------------------------------------------------------------------------------
Cert Validation Code = 0
-----BEGIN CERTIFICATE-----
MIIFADCCA+igAwIBAgIQMByhA73ZSh4Awq7goDvd1jANBgkqhkiG9w0BAQUFADCB
sDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL
ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug
YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykwNTEqMCgGA1UEAxMh
VmVyaVNpZ24gQ2xhc3MgMyBTZWN1cmUgU2VydmVyIENBMB4XDTA4MTExOTAwMDAw
MFoXDTEwMTIwNDIzNTk1OVowdDELMAkGA1UEBhMCVVMxDzANBgNVBAgTBk9yZWdv
bjERMA8GA1UEBxQIUG9ydGxhbmQxFTATBgNVBAoUDENvbi13YXkgSW5jLjEQMA4G
A1UECxQHQ29uLXdheTEYMBYGA1UEAxQPd3d3LmNvbi13YXkuY29tMIGfMA0GCSqG
SIb3DQEBAQUAA4GNADCBiQKBgQCvi+QQSXbIG4f0wXmfhzeZd0QGyrL3aXJXcHRx
hPqya3B0waex1fFD9BWBLe3sXZkg6LCQamugsy3er5MPDYmb0ycuoSL3UFg5Nzaj
oHjVVo3a6Rsq+ThKaU5OB9hnfnDkF0YY1OYiiRyiToKhzr+/9dAWPyv/Tzisr7GC
ecx+hwIDAQABo4IB0zCCAc8wCQYDVR0TBAIwADALBgNVHQ8EBAMCBaAwRAYDVR0f
BD0wOzA5oDegNYYzaHR0cDovL1NWUlNlY3VyZS1jcmwudmVyaXNpZ24uY29tL1NW
UlNlY3VyZTIwMDUuY3JsMEQGA1UdIAQ9MDswOQYLYIZIAYb4RQEHFwMwKjAoBggr
BgEFBQcCARYcaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYTAdBgNVHSUEFjAU
BggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUb+yvoN2KpO/1KhBnLT9V
grzX7yUweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC52
ZXJpc2lnbi5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9TVlJTZWN1cmUtYWlhLnZl
cmlzaWduLmNvbS9TVlJTZWN1cmUyMDA1LWFpYS5jZXIwbgYIKwYBBQUHAQwEYjBg
oV6gXDBaMFgwVhYJaW1hZ2UvZ2lmMCEwHzAHBgUrDgMCGgQUS2u5KJYGDLvQUjib
KaxLB4shBRgwJhYkaHR0cDovL2xvZ28udmVyaXNpZ24uY29tL3ZzbG9nbzEuZ2lm
MA0GCSqGSIb3DQEBBQUAA4IBAQACbSuw0fQ3OGsM+xBuiaqTirc/2uiBD7iKgR6i
EvMGAIAlTZGaSQb+5yzc9T7JJsxFDEN3fdyIM8QL+F227f8mBd34Pjvjxx1niJO8
3a6zYSr8PYGCr6afLiWf0dcyltfX3fXZqnEa7qHcqxXIWT59cqhGuWR+CJiSHkCP
ocfCKRXBD62orrqQEVKKaCVOJeEtMmxI3LviY43brySlMBzgHY5F51N/XOtZguPx
vAXBjmfJP01V+fWOoPAhVS9Odza4msFZpyjEXW69NmMz76kRwL04lX4tQJkv+m12
F7+6K7oKiYBvYup9b1ZwyaO91WLZcaNNgPo9y5FT0WKnJRPI
-----END CERTIFICATE-----
Serial Number: 30:1C:A1:03:BD:D9:4A:1E:00:C2:AE:E0:A0:3B:DD:D6
Common Name: www.con-way.com
Country: US
State/Province: Oregon
Locality: Portland
Org Unit: Con-way Inc.
Org: Con-way
Issuer CN: VeriSign Class 3 Secure Server CA
Issuer Country: US
Issuer Org: VeriSign, Inc.
Issuer Org Unit: Terms of use at https://www.verisign.com/rpa (c)05, OU=VeriSign Trust Network
Unknown Field: 03
Unknown Field: 20081118190000
Unknown Field: 20101204185959
Unknown Field: 1.2.840.113549.1.1.5

Protocol Used: TLS Version 1
http_persist_get(): entered
http_long_ParseURL(): entered
do_get(): entered
GET /XMLj/X-Rate HTTP/1.1
Host: www.Con-way.com
User-Agent: http-api/1.21


recvresp(): entered
HTTP/1.1 401 Authorization Required
Date: Fri, 07 May 2010 03:15:59 GMT
Server: Sun-ONE-Web-Server/6.1
WWW-Authenticate: Basic realm="CON-WAY"
$WSEP: 
Set-Cookie: JSESSIONIDDW=00019WZfGE8NWSx4F51msVSnSUN:11r9qrkb9; Path=/
Transfer-Encoding: chunked
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: BIGipServerp-prod-www.con-way.com=1684932106.36895.0000; path=/
Vary: Accept-Encoding, User-Agent


SetError() #13: HTTP/1.1 401 Authorization Required
recvdoc parms: chunked 0
interpret_auth(): entered
SetError() #36: This page requires a user-id & password
http_close(): entered
http_getauth(): entered
http_setauth(): entered
http_persist_open(): entered
http_long_ParseURL(): entered
-------------------------------------------------------------------------------------
Dump of server-side certificate information:
-------------------------------------------------------------------------------------
Cert Validation Code = 0
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Serial Number: 30:1C:A1:03:BD:D9:4A:1E:00:C2:AE:E0:A0:3B:DD:D6
Common Name: www.con-way.com
Country: US
State/Province: Oregon
Locality: Portland
Org Unit: Con-way Inc.
Org: Con-way
Issuer CN: VeriSign Class 3 Secure Server CA
Issuer Country: US
Issuer Org: VeriSign, Inc.
Issuer Org Unit: Terms of use at https://www.verisign.com/rpa (c)05, OU=VeriSign Trust Network
Unknown Field: 03
Unknown Field: 20081118190000
Unknown Field: 20101204185959
Unknown Field: 1.2.840.113549.1.1.5

Protocol Used: TLS Version 1
http_persist_post(): entered
http_long_ParseURL(): entered
do_post(): entered
POST /XMLj/X-Rate HTTP/1.1
Host: www.Con-way.com
User-Agent: http-api/1.21
Content-Type: text/xml
Expect: 100-continue
Content-Length: 341
Authorization: Basic cHJpbnRnZWFyOlByaW50Z2VhcjE=


recvresp(): entered
HTTP/1.1 100 Continue


SetError() #13: HTTP/1.1 100 Continue
senddoc(): entered
<?xml version="1.0" encoding="ISO-8859-1" ?><RateRequest><OriginZip country="us">29033</OriginZip><DestinationZip country="us">29405</DestinationZip><CustNmbr shipcode="S">26450611</CustNmbr><ChargeCode>P</ChargeCode><EffectiveDate>5/10/10</EffectiveDate><Item><CmdtyClass>775</CmdtyClass><Weight unit="lbs">500</Weight></Item></RateRequest>
recvresp(): entered
HTTP/1.1 200 OK
Date: Fri, 07 May 2010 03:16:15 GMT
Server: Sun-ONE-Web-Server/6.1
Set-Cookie: LtpaToken2=AHhwRH+F2vDYPomdmTFcQIkrby4yXz90CisjkOBGv8Sxa3CIROufYHHApHhpmCyw/W3uK2wiKqK6aFTnYcSp7JZBfkqzJntXwfhH8rybiBdY3pzv4d4gkvjFBJHQNQ6guRvBr+Ktd3mcauQR/ITCnBe8lX3Mm/90ody1J3+eHACer6j52YNRvNu4Dh/hYuX0mFr/V0qZZ+Y2bzn3JUkUT2F79/+GwdOWLgoM5ljdBxtK8Tcu0qi+ZBu40qmYcONreCz8x8o9q69brh5Vzqz0I0Hm0vhkgmJ9+c+/YV+rmejUDesvgAlr6NKNU3XBIgAZvnboZTFanMT7F6n2ZhYO03OYNpUY1zq3Yn8I/j/Ds/lIBZpAEQpxID/AaJjoVbbCdEEF6euFgJkuNg+/DyajWKXrenkwKz9d+b5cKX1rt+cdlDQoLHO/OxaA1O46x1S8CkWo+miHL1OAHNW2nQAoX6wZFBu3KiuVx8qQw86zusGhFoKofz90qZH02xcBdJfq+tskOJMFWvq7dbWiJsnStJxpbDLq5uQx/eaC/YDC1WnPtGsw6U7hvvrXv1CfeVqjVB/WcxIrUbJmoNHXGXnrguAs9+HA0l5BfQnoyBoMorEjb5dM2GDXKn4KYpozQCewTFBQT9xHIErz4oXhSZohmihMq74v7zv8+68b9PAWKKA=; Path=/
Set-Cookie: LtpaToken=qEfVBS4DRJeAibyH4Ncg7J/4P9WeZktS5OskSeSUyTlH/DTFdC9SVNjVapkPL3eOAIGPB85T477TeYUZAI+Ft05wNmUM7o8MYrLsUwR4Ao6pFK/SM3RiCo3zu085Psc9yG5S2G9kdQy4jfD4sTv1sA36jQC5MWXzqXYtc0vfRsjL6AxNGEyxmWY/UO5c3tSKygiTqnNot5pjcSkWbkEUEZ98dc/LdYNzT2qw495rjxtvfqByN99ZqbYDwha8470tCoGwUBykAwjVT1WhpRDamotAR71XFMohvi7/GlI0I01POitV2OugokRmlaQy+Kl0IdAa8MBYiEgNxKHrfycK4w==; Path=/
Set-Cookie: user=printgear; Path=/
x-username: printgear
Transfer-Encoding: chunked
Content-Type: text/xml
Content-Language: en-US
Set-Cookie: BIGipServerp-prod-www.con-way.com=1684932106.36895.0000; path=/
Vary: Accept-Encoding, User-Agent


SetError() #13: HTTP/1.1 200 OK
recvdoc parms: chunked 0
header_load_cookies() entered
cookie_parse() entered
cookie =  LtpaToken2=AHhwRH+F2vDYPomdmTFcQIkrby4yXz90CisjkOBGv8Sxa3CIROufYHHApHhpmCyw/W3uK2wiKqK6aFTnYcSp7JZBfkqzJntXwfhH8rybiBdY3pzv4d4gkvjFBJHQNQ6guRvBr+Ktd3mcauQR/ITCnBe8lX3Mm/90ody1J3+eHACer6j52YNRvNu4Dh/hYuX0mFr/V0qZZ+Y2bzn3JUkUT2F79/+GwdOWLgoM5ljdBxt
cookie attr ltpatoken2=AHhwRH+F2vDYPomdmTFcQIkrby4yXz90CisjkOBGv8Sxa3CIROufYHHApHhpmCyw/W3uK2wiKqK6aFTnYcSp7JZBfkqzJntXwfhH8rybiBdY3pzv4d4gkvjFBJHQNQ6guRvBr+Ktd3mcauQR/ITCnBe8lX3Mm/90ody1J3+eHACer6j52YNRvNu4Dh/hYuX0mFr/V0qZZ+Y2bzn3JUkUT2F79/+GwdOWLgoM5ljdB
cookie attr path=/
cookie_parse() entered
cookie =  LtpaToken=qEfVBS4DRJeAibyH4Ncg7J/4P9WeZktS5OskSeSUyTlH/DTFdC9SVNjVapkPL3eOAIGPB85T477TeYUZAI+Ft05wNmUM7o8MYrLsUwR4Ao6pFK/SM3RiCo3zu085Psc9yG5S2G9kdQy4jfD4sTv1sA36jQC5MWXzqXYtc0vfRsjL6AxNGEyxmWY/UO5c3tSKygiTqnNot5pjcSkWbkEUEZ98dc/LdYNzT2qw495rjxtv
cookie attr ltpatoken=qEfVBS4DRJeAibyH4Ncg7J/4P9WeZktS5OskSeSUyTlH/DTFdC9SVNjVapkPL3eOAIGPB85T477TeYUZAI+Ft05wNmUM7o8MYrLsUwR4Ao6pFK/SM3RiCo3zu085Psc9yG5S2G9kdQy4jfD4sTv1sA36jQC5MWXzqXYtc0vfRsjL6AxNGEyxmWY/UO5c3tSKygiTqnNot5pjcSkWbkEUEZ98dc/LdYNzT2qw495rjx
cookie attr path=/
cookie_parse() entered
cookie =  user=printgear; Path=/
cookie attr user=printgear
cookie attr path=/
cookie_parse() entered
cookie =  BIGipServerp-prod-www.con-way.com=1684932106.36895.0000; path=/
cookie attr bigipserverp-prod-www.con-way.com=1684932106.36895.0000
cookie attr path=/
recvchunk(): entered
get_chunk_size(): entered
cc

chunk size = 204
get_chunk_size returned 204
calling comm_blockread
<?xml version="1.0" encoding="ISO-8859-1"?> <RateQuote xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"; xsi:noNamespaceSchemaLocation="http://www.con-way.com/XML/RateQuote.xsd"; schemaVersion="1.0" />
comm_blockread returned 204


get_chunk_size(): entered
d

chunk size = 13
get_chunk_size returned 13
calling comm_blockread
Error 500: 

comm_blockread returned 13


get_chunk_size(): entered
0

chunk size = 0
get_chunk_size returned 0
http_close(): entered
SetError() #66: XML parse failed at line 1, col 204: junk after document element
-----------------------------------------------------------------------
This is the FTPAPI mailing list.  To unsubscribe, please go to:
http://www.scottklement.com/mailman/listinfo/ftpapi
-----------------------------------------------------------------------