The blue and the first green are just reading the configuration of SSL on your box. Between the first green and the dump of the local certificate, HTTPAPI calls the system functions to initialize SSL as a client. I suspect that it is the call to gsk_environment_init
that is your delay, but I'm not sure how that could be speed up. I just ran a quick test and I'm almost 1/2 a second. This is on a 9009-41A running with 5 cores.
Hi,
Thanks for your previous replies. I'm currently getting the WEB servers developers to check their timings, as they also call another external webservice, it could be down to that.
I have another similar problem, but the holdup is in a different portion of the HTTPAPI log, again only on the 1st call to another internal webservice on a different server. The trouble is I don't know what the additional piece of 1st time process is doing,
and what can be done to reduce/remove it?
I've highlighted the additional parts in the 1st run in blue and green, the time issue seems to be in the bit in green?
Thanks 🙂
1st run
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.27.670000: http_persist_open(): entered
2020-03-17-14.31.27.691000: http_long_ParseURL(): entered
2020-03-17-14.31.27.691000: DNS resolver retrans: 2
2020-03-17-14.31.27.691000: DNS resolver retry
: 2
2020-03-17-14.31.27.691000: DNS resolver options: x'00000136'
2020-03-17-14.31.27.692000: DNS default domain: PARK.LAN
2020-03-17-14.31.27.692000: DNS server found: 10.1.2.15
2020-03-17-14.31.27.692000: DNS server found: 10.1.2.16
2020-03-17-14.31.27.695000: https_init(): entered
2020-03-17-14.31.27.696000: QSSLPCL = *OPSYS
2020-03-17-14.31.27.696000: SSL version 2 support disabled
2020-03-17-14.31.27.696000: SSL version 3 support disabled
2020-03-17-14.31.27.696000: Old interface to TLS version 1.0 support enabled
2020-03-17-14.31.27.696000: TLS version 1.0 support enabled
2020-03-17-14.31.27.696000: TLS version 1.1 support enabled
2020-03-17-14.31.27.696000: TLS version 1.2 support enabled
2020-03-17-14.31.28.854000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.855000: Dump of local-side certificate information:
2020-03-17-14.31.28.855000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.855000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-03-17-14.31.28.855000: SNI hostname set to: uatflexecash.park.lan
2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.869000: Dump of server-side certificate information:
2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.869000: Cert Validation Code = 0
2020-03-17-14.31.28.902000: -----BEGIN CERTIFICATE-----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2020-03-17-14.31.28.902000: -----END CERTIFICATE-----
Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52
Common Name: uatflexecash.park.lan
Country: uk
State/Province: Merseyside
Locality: birkenhead
Org Unit: Park Group PLC
Org: Valley Road
Issuer CN: uatflexecash.park.lan
Issuer Country: uk
Issuer State/Province: Merseyside
Issuer Locality: birkenhead
Issuer Org: Park Group PLC
Issuer Org Unit: Valley Road
Version: 3
not before: 20161101091150
Unknown Field: 09:11:50 01-11-2016
not after: 20260118091150
Unknown Field: 09:11:50 18-01-2026
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field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
Unknown Field: 2048
Unknown Field: D6DDA66646FB208C03203D3059AA3945
Unknown Field: 1.2.840.113549.2.5
Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD
Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4
Unknown Field: 1
2020-03-17-14.31.28.904000: Protocol Used: TLS Version 1.2
2020-03-17-14.31.28.904000: http_persist_post(): entered
2020-03-17-14.31.28.904000: http_persist_req(POST) entered.
2020-03-17-14.31.28.904000: http_long_ParseURL(): entered
2020-03-17-14.31.28.904000: http_long_ParseURL(): entered
2020-03-17-14.31.28.905000: do_oper(POST): entered
2020-03-17-14.31.28.905000: There are 0 cookies in the cache
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=204
POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1
Host: uatflexecash.park.lan:9443
User-Agent: http-api/1.39
Content-Type: text/xml;charset=UTF-8
SOAPAction: ""
Content-Length: 943
2020-03-17-14.31.28.905000: senddoc(): entered
2020-03-17-14.31.28.905000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943
<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security
soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password
Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest>
</soapenv:Body> </soapenv:Envelope>
2020-03-17-14.31.28.905000: senddoc(): comm_blockWrite returned 943
2020-03-17-14.31.28.906000: recvresp(): entered
2020-03-17-14.31.28.906000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32750
Content-Type: text/xml; charset=UTF-8
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32711
Content-Language: en-US
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32686
Date: Tue, 17 Mar 2020 14:32:30 GMT
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32649
Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32510
Transfer-Encoding: chunked
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32482
2020-03-17-14.31.28.965000: recvresp: empty line, ending header, number of eol chars=2
2020-03-17-14.31.28.965000: recvresp: header resp code = 200
repeating=0
2020-03-17-14.31.28.965000: SetError() #13: HTTP/1.1 200 OK
2020-03-17-14.31.28.965000: recvresp(): end with 200
2020-03-17-14.31.28.965000: recvdoc parms: chunked 0
2020-03-17-14.31.28.965000: header_load_cookies() entered
2020-03-17-14.31.28.965000: cookie_parse() entered
2020-03-17-14.31.28.965000: cookie =
TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.28.965000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c
2020-03-17-14.31.28.965000: cookie attr Path=/
2020-03-17-14.31.28.965000: recvchunk(): entered
2020-03-17-14.31.28.965000: get_chunk_size(): entered
242
2020-03-17-14.31.28.966000: chunk size = 578
2020-03-17-14.31.28.966000: get_chunk_size returned 578
2020-03-17-14.31.28.966000: calling comm_blockread
<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/"
xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>
2020-03-17-14.31.28.966000: comm_blockread returned 578
2020-03-17-14.31.28.966000: get_chunk_size(): entered
0
2020-03-17-14.31.28.966000: chunk size = 0
2020-03-17-14.31.28.966000: get_chunk_size returned 0
2020-03-17-14.31.28.966000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.31.857000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0
2nd run
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.31.859000: http_persist_open(): entered
2020-03-17-14.31.31.862000: http_long_ParseURL(): entered
2020-03-17-14.31.31.862000: DNS resolver retrans: 2
2020-03-17-14.31.31.862000: DNS resolver retry
: 2
2020-03-17-14.31.31.862000: DNS resolver options: x'00000136'
2020-03-17-14.31.31.862000: DNS default domain: PARK.LAN
2020-03-17-14.31.31.862000: DNS server found: 10.1.2.15
2020-03-17-14.31.31.862000: DNS server found: 10.1.2.16
2020-03-17-14.31.31.863000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-03-17-14.31.31.863000: SNI hostname set to: uatflexecash.park.lan
2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------
2020-03-17-14.31.31.864000: Dump of server-side certificate information:
2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------
2020-03-17-14.31.31.864000: Cert Validation Code = 0
2020-03-17-14.31.31.878000: -----BEGIN CERTIFICATE-----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2020-03-17-14.31.31.878000: -----END CERTIFICATE-----
Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52
Common Name: uatflexecash.park.lan
Country: uk
State/Province: Merseyside
Locality: birkenhead
Org Unit: Park Group PLC
Org: Valley Road
Issuer CN: uatflexecash.park.lan
Issuer Country: uk
Issuer State/Province: Merseyside
Issuer Locality: birkenhead
Issuer Org: Park Group PLC
Issuer Org Unit: Valley Road
Version: 3
not before: 20161101091150
Unknown Field: 09:11:50 01-11-2016
not after: 20260118091150
Unknown Field: 09:11:50 18-01-2026
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field: 0382010F003082010A0282010100DCCAE2F28D86C19452EB36791C8658E4BD73B950E8C3E1B7BA03AAD9B147EC6691687C8829E899AA8C88A534737A009ABC30B1B0D41591E9EC70D4A9FBB723C8E544FE610EE57440E82EEEC3EAC46242D81AE102D32A65F981462123239D471C6EF97FDA0BE4F0985B0420BE5FB230EC0EB6E0D2B56BF2A78A2F5168CB88172276D722FCE1B4A3C7EF6A4AA99E5AE1885424A7E509CC7901AEA0FB1FA974EA44D3FD9ED92C8B555190EAFC622BF30450637C562C21048A86D8B2159B2BFFAB5D5CF3BAFD259131CE60FED63907C5AF42079CF98FA3819D6768A42CA52CAE0A1813EF46F31BCD36F88692DECD1571CDEEE5F37A1531E69800EC9B2FB582A115C70203010001
Unknown Field: 2048
Unknown Field: D6DDA66646FB208C03203D3059AA3945
Unknown Field: 1.2.840.113549.2.5
Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD
Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4
Unknown Field: 1
2020-03-17-14.31.31.879000: Protocol Used: TLS Version 1.2
2020-03-17-14.31.31.879000: http_persist_post(): entered
2020-03-17-14.31.31.879000: http_persist_req(POST) entered.
2020-03-17-14.31.31.880000: http_long_ParseURL(): entered
2020-03-17-14.31.31.880000: http_long_ParseURL(): entered
2020-03-17-14.31.31.880000: do_oper(POST): entered
2020-03-17-14.31.31.880000: There are 1 cookies in the cache
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=353
POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1
Host: uatflexecash.park.lan:9443
User-Agent: http-api/1.39
Content-Type: text/xml;charset=UTF-8
SOAPAction: ""
Content-Length: 943
Cookie: $Version=0; TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; $Path=/;
2020-03-17-14.31.31.880000: senddoc(): entered
2020-03-17-14.31.31.880000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943
<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security
soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password
Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest>
</soapenv:Body> </soapenv:Envelope>
2020-03-17-14.31.31.880000: senddoc(): comm_blockWrite returned 943
2020-03-17-14.31.31.880000: recvresp(): entered
2020-03-17-14.31.31.880000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32750
Content-Type: text/xml; charset=UTF-8
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32711
Content-Language: en-US
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32686
Date: Tue, 17 Mar 2020 14:32:33 GMT
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32649
Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32510
Transfer-Encoding: chunked
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32482
2020-03-17-14.31.31.928000: recvresp: empty line, ending header, number of eol chars=2
2020-03-17-14.31.31.929000: recvresp: header resp code = 200
repeating=0
2020-03-17-14.31.31.929000: SetError() #13: HTTP/1.1 200 OK
2020-03-17-14.31.31.929000: recvresp(): end with 200
2020-03-17-14.31.31.929000: recvdoc parms: chunked 0
2020-03-17-14.31.31.929000: header_load_cookies() entered
2020-03-17-14.31.31.929000: cookie_parse() entered
2020-03-17-14.31.31.929000: cookie =
TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.31.929000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c
2020-03-17-14.31.31.929000: cookie attr Path=/
2020-03-17-14.31.31.929000: recvchunk(): entered
2020-03-17-14.31.31.929000: get_chunk_size(): entered
242
2020-03-17-14.31.31.929000: chunk size = 578
2020-03-17-14.31.31.929000: get_chunk_size returned 578
2020-03-17-14.31.31.929000: calling comm_blockread
<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/"
xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>
2020-03-17-14.31.31.929000: comm_blockread returned 578
2020-03-17-14.31.31.929000: get_chunk_size(): entered
0
2020-03-17-14.31.31.929000: chunk size = 0
2020-03-17-14.31.31.929000: get_chunk_size returned 0
2020-03-17-14.31.31.929000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.33.192000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0