--Hi Scott,
I wonder if you have anything to add about the time take to do the SSL part of HTTPAPI?I've included another call below and as you can see, this call takes 12 seconds (highlighted in green) to process this on the 1st call. If we are relying on fast calls, do we need to structure this so that only one SSL is done per day or are we missing something else that need setting to make it quicker?
Thanks, Lawrence
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-04-01-17.14.29.326000: http_url_post(): entered
2020-04-01-17.14.29.357000: http_persist_open(): entered
2020-04-01-17.14.29.357000: http_long_ParseURL(): entered
2020-04-01-17.14.29.357000: DNS resolver retrans: 2
2020-04-01-17.14.29.357000: DNS resolver retry : 2
2020-04-01-17.14.29.357000: DNS resolver options: x'00000136'
2020-04-01-17.14.29.358000: DNS default domain: PARK.LAN
2020-04-01-17.14.29.358000: DNS server found: 10.1.2.15
2020-04-01-17.14.29.358000: DNS server found: 10.1.2.16
2020-04-01-17.14.29.367000: https_init(): entered
2020-04-01-17.14.29.367000: QSSLPCL = *OPSYS
2020-04-01-17.14.29.367000: SSL version 2 support disabled
2020-04-01-17.14.29.367000: SSL version 3 support disabled
2020-04-01-17.14.29.367000: Old interface to TLS version 1.0 support enabled
2020-04-01-17.14.29.368000: TLS version 1.0 support enabled
2020-04-01-17.14.29.368000: TLS version 1.1 support enabled
2020-04-01-17.14.29.368000: TLS version 1.2 support enabled
2020-04-01-17.14.41.546000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.546000: Dump of local-side certificate information:
2020-04-01-17.14.41.546000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.546000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-04-01-17.14.41.547000: SNI hostname set to: mastercardwrapperservice.prl.co.uk
2020-04-01-17.14.41.651000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.651000: Dump of server-side certificate information:
2020-04-01-17.14.41.652000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.652000: Cert Validation Code = 0
2020-04-01-17.14.41.799000: -----BEGIN CERTIFICATE-----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=
2020-04-01-17.14.41.800000: -----END CERTIFICATE-----
Serial Number: 00:EA:6B:E5:85:50:E2:9F:73
Common Name: mastercardwrapperservice.prl.co.uk
Country: GB
State/Province: Merseyside
Locality: Birkenhead
Org Unit: Park Group plc
Org: GTS
Issuer CN: mastercardwrapperservice.prl.co.uk
Issuer Country: GB
Issuer State/Province: Merseyside
Issuer Locality: Birkenhead
Issuer Org: Park Group plc
Issuer Org Unit: GTS
Version: 3
not before: 20160916093454
Unknown Field: 09:34:54 16-09-2016
not after: 20251203083454
Unknown Field: 08:34:54 03-12-2025
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field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
Unknown Field: 2048
Unknown Field: C435760EB4286E3E9FD5DD77986221CD
Unknown Field: 1.2.840.113549.2.5
Unknown Field: FAA5D37EF415959057E2E1719772B538E73DD4D6
Unknown Field: 2AFCFE318E71A1CEA15D91B1167BD4A784ED37227D74A279553BFCBC08CA91D3
Unknown Field: 1
2020-04-01-17.14.41.804000: Protocol Used: TLS Version 1.2
2020-04-01-17.14.41.804000: http_persist_post(): entered
2020-04-01-17.14.41.804000: http_persist_req(POST) entered.
2020-04-01-17.14.41.804000: http_long_ParseURL(): entered
2020-04-01-17.14.41.804000: http_long_ParseURL(): entered
2020-04-01-17.14.41.804000: do_oper(POST): entered
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=5, flags=00000084, blocking=0
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=206
POST /mastercard-wrapper-service/CardUnload?wsdl HTTP/1.1
User-Agent: http-api/1.39
Content-Type: text/xml; charset=UTF-8
SOAPAction: ""
Content-Length: 858
2020-04-01-17.14.41.805000: senddoc(): entered
2020-04-01-17.14.41.805000: senddoc(): data left=858, chunk size=858, timeout=60, calling comm_blockWrite...
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=5, flags=00000084, blocking=0
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=858
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ser="http://service.mastercard.ws.parkgroup.co.uk/"> <soapenv:Header><wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" ><wsse:UsernameToken><wsse:Username>devsuppg@xxxxxxxxxxxxxxx</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">xxxxxxxxxxxxxxxx</wsse:Password></wsse:UsernameToken></wsse:Security></soapenv:Header><soapenv:Body><ser:handleCardUnload><cardUnloadRequest><cardId>xxxxxxxxxxxxxxxx</cardId><cvv></cvv><pan></pan><parkReference></parkReference></cardUnloadRequest></ser:handleCardUnload></soapenv:Body></soapenv:Envelope>
2020-04-01-17.14.41.806000: senddoc(): comm_blockWrite returned 858
2020-04-01-17.14.41.806000: recvresp(): entered
2020-04-01-17.14.41.806000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK
2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32750
Date: Wed, 01 Apr 2020 16:15:44 GMT
2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32713
Content-Type: text/xml;charset=utf-8
2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32675
Vary: Accept-Encoding
2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32652
Set-Cookie: JSESSIONID=8256C785FF963BDF866ECB3531C58D80; Path=/mastercard-wrapper-service/; HttpOnly
2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32550
Set-Cookie: TS01a90bac=010c8805f63a1b5e6cf788838d7ee727723cf0f4c9ca077158f2ce4beece6688c3148ef0fe299eea6344081b746e6585c0f7b6d36e; Path=/
2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32411
Set-Cookie: TS014c158a=010c8805f6ec669d8527b7fd922cf1d7d921e384a8ca077158f2ce4beece6688c3148ef0fe5fb7629355d5b751cc8b7f62b393e987897dced7d937cf5818d4b17244db34a2; path=/mastercard-wrapper-service/
2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32213
Transfer-Encoding: chunked
2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32185
2020-04-01-17.14.42.512000: recvresp: empty line, ending header, number of eol chars=2
2020-04-01-17.14.42.512000: recvresp: header resp code = 200 repeating=0
2020-04-01-17.14.42.512000: SetError() #13: HTTP/1.1 200 OK
2020-04-01-17.14.42.512000: recvresp(): end with 200
2020-04-01-17.14.42.513000: recvdoc parms: chunked 0
2020-04-01-17.14.42.513000: recvchunk(): entered
2020-04-01-17.14.42.514000: get_chunk_size(): entered
223
2020-04-01-17.14.42.514000: chunk size = 547
2020-04-01-17.14.42.514000: get_chunk_size returned 547
2020-04-01-17.14.42.514000: calling comm_blockread
<?xml version='1.0' encoding='UTF-8'?><S:Envelope xmlns:S="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"><SOAP-ENV:Header/><S:Body><ns2:handleCardUnloadResponse xmlns:ns2="http://service.mastercard.ws.parkgroup.co.uk/"><cardUnloadResponse><amountUnload>00.00</amountUnload><availableBalance>0.0</availableBalance><blockedAmount>0.0</blockedAmount><currencyCode>GBP</currencyCode><message><status>OK</status></message></cardUnloadResponse></ns2:handleCardUnloadResponse></S:Body></S:Envelope>
2020-04-01-17.14.42.514000: comm_blockread returned 547
2020-04-01-17.14.42.515000: get_chunk_size(): entered
0
2020-04-01-17.14.42.516000: chunk size = 0
2020-04-01-17.14.42.516000: get_chunk_size returned 0
2020-04-01-17.14.42.516000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-04-01-17.14.42.751000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0
From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx <ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx> on behalf of Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx>
Sent: 18 March 2020 17:11
To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [Ftpapi] Another HTTPAPI log questionPersonally we just accept it. We aren't calling any services in enough volume to notice the delay.
On Wed, 2020-03-18 at 10:58 +0000, Lawrence Loz wrote:Maybe the only way around this is to restructure and have a background job running so that this 1st process only happens once a day? Does everyone else just accept this initial delay or do you structure it to keep the connection open? Thanks
From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx <ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx> on behalf of Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx>
Sent: Tuesday, March 17, 2020 4:06:02 PM
To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [Ftpapi] Another HTTPAPI log questionThe blue and the first green are just reading the configuration of SSL on your box. Between the first green and the dump of the local certificate, HTTPAPI calls the system functions to initialize SSL as a client. I suspect that it is the call to gsk_environment_init that is your delay, but I'm not sure how that could be speed up. I just ran a quick test and I'm almost 1/2 a second. This is on a 9009-41A running with 5 cores.
2020-03-17-11.01.27.751000: TLS version 1.2 support enabled2020-03-17-11.01.28.203000: -------------------------------------------2020-03-17-11.01.28.203000: Dump of local-side certificate information:
On Tue, 2020-03-17 at 15:27 +0000, Lawrence Loz wrote:Hi,
Thanks for your previous replies. I'm currently getting the WEB servers developers to check their timings, as they also call another external webservice, it could be down to that.
I have another similar problem, but the holdup is in a different portion of the HTTPAPI log, again only on the 1st call to another internal webservice on a different server. The trouble is I don't know what the additional piece of 1st time process is doing, and what can be done to reduce/remove it?
I've highlighted the additional parts in the 1st run in blue and green, the time issue seems to be in the bit in green?
Thanks 🙂
1st runHTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.27.670000: http_persist_open(): entered
2020-03-17-14.31.27.691000: http_long_ParseURL(): entered
2020-03-17-14.31.27.691000: DNS resolver retrans: 2
2020-03-17-14.31.27.691000: DNS resolver retry : 2
2020-03-17-14.31.27.691000: DNS resolver options: x'00000136'
2020-03-17-14.31.27.692000: DNS default domain: PARK.LAN
2020-03-17-14.31.27.692000: DNS server found: 10.1.2.15
2020-03-17-14.31.27.692000: DNS server found: 10.1.2.16
2020-03-17-14.31.27.695000: https_init(): entered
2020-03-17-14.31.27.696000: QSSLPCL = *OPSYS
2020-03-17-14.31.27.696000: SSL version 2 support disabled
2020-03-17-14.31.27.696000: SSL version 3 support disabled
2020-03-17-14.31.27.696000: Old interface to TLS version 1.0 support enabled
2020-03-17-14.31.27.696000: TLS version 1.0 support enabled
2020-03-17-14.31.27.696000: TLS version 1.1 support enabled
2020-03-17-14.31.27.696000: TLS version 1.2 support enabled
2020-03-17-14.31.28.854000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.855000: Dump of local-side certificate information:
2020-03-17-14.31.28.855000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.855000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-03-17-14.31.28.855000: SNI hostname set to: uatflexecash.park.lan
2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.869000: Dump of server-side certificate information:
2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------
2020-03-17-14.31.28.869000: Cert Validation Code = 0
2020-03-17-14.31.28.902000: -----BEGIN CERTIFICATE-----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2020-03-17-14.31.28.902000: -----END CERTIFICATE-----
Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52
Common Name: uatflexecash.park.lan
Country: uk
State/Province: Merseyside
Locality: birkenhead
Org Unit: Park Group PLC
Org: Valley Road
Issuer CN: uatflexecash.park.lan
Issuer Country: uk
Issuer State/Province: Merseyside
Issuer Locality: birkenhead
Issuer Org: Park Group PLC
Issuer Org Unit: Valley Road
Version: 3
not before: 20161101091150
Unknown Field: 09:11:50 01-11-2016
not after: 20260118091150
Unknown Field: 09:11:50 18-01-2026
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field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
Unknown Field: 2048
Unknown Field: D6DDA66646FB208C03203D3059AA3945
Unknown Field: 1.2.840.113549.2.5
Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD
Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4
Unknown Field: 1
2020-03-17-14.31.28.904000: Protocol Used: TLS Version 1.2
2020-03-17-14.31.28.904000: http_persist_post(): entered
2020-03-17-14.31.28.904000: http_persist_req(POST) entered.
2020-03-17-14.31.28.904000: http_long_ParseURL(): entered
2020-03-17-14.31.28.904000: http_long_ParseURL(): entered
2020-03-17-14.31.28.905000: do_oper(POST): entered
2020-03-17-14.31.28.905000: There are 0 cookies in the cache
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=204
POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1
Host: uatflexecash.park.lan:9443
User-Agent: http-api/1.39
Content-Type: text/xml;charset=UTF-8
SOAPAction: ""
Content-Length: 943
2020-03-17-14.31.28.905000: senddoc(): entered
2020-03-17-14.31.28.905000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943
<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>
2020-03-17-14.31.28.905000: senddoc(): comm_blockWrite returned 943
2020-03-17-14.31.28.906000: recvresp(): entered
2020-03-17-14.31.28.906000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32750
Content-Type: text/xml; charset=UTF-8
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32711
Content-Language: en-US
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32686
Date: Tue, 17 Mar 2020 14:32:30 GMT
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32649
Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32510
Transfer-Encoding: chunked
2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32482
2020-03-17-14.31.28.965000: recvresp: empty line, ending header, number of eol chars=2
2020-03-17-14.31.28.965000: recvresp: header resp code = 200 repeating=0
2020-03-17-14.31.28.965000: SetError() #13: HTTP/1.1 200 OK
2020-03-17-14.31.28.965000: recvresp(): end with 200
2020-03-17-14.31.28.965000: recvdoc parms: chunked 0
2020-03-17-14.31.28.965000: header_load_cookies() entered
2020-03-17-14.31.28.965000: cookie_parse() entered
2020-03-17-14.31.28.965000: cookie = TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.28.965000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c
2020-03-17-14.31.28.965000: cookie attr Path=/
2020-03-17-14.31.28.965000: recvchunk(): entered
2020-03-17-14.31.28.965000: get_chunk_size(): entered
242
2020-03-17-14.31.28.966000: chunk size = 578
2020-03-17-14.31.28.966000: get_chunk_size returned 578
2020-03-17-14.31.28.966000: calling comm_blockread
<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>
2020-03-17-14.31.28.966000: comm_blockread returned 578
2020-03-17-14.31.28.966000: get_chunk_size(): entered
0
2020-03-17-14.31.28.966000: chunk size = 0
2020-03-17-14.31.28.966000: get_chunk_size returned 0
2020-03-17-14.31.28.966000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.31.857000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0
2nd run
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.31.859000: http_persist_open(): entered
2020-03-17-14.31.31.862000: http_long_ParseURL(): entered
2020-03-17-14.31.31.862000: DNS resolver retrans: 2
2020-03-17-14.31.31.862000: DNS resolver retry : 2
2020-03-17-14.31.31.862000: DNS resolver options: x'00000136'
2020-03-17-14.31.31.862000: DNS default domain: PARK.LAN
2020-03-17-14.31.31.862000: DNS server found: 10.1.2.15
2020-03-17-14.31.31.862000: DNS server found: 10.1.2.16
2020-03-17-14.31.31.863000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-03-17-14.31.31.863000: SNI hostname set to: uatflexecash.park.lan
2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------
2020-03-17-14.31.31.864000: Dump of server-side certificate information:
2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------
2020-03-17-14.31.31.864000: Cert Validation Code = 0
2020-03-17-14.31.31.878000: -----BEGIN CERTIFICATE-----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2020-03-17-14.31.31.878000: -----END CERTIFICATE-----
Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52
Common Name: uatflexecash.park.lan
Country: uk
State/Province: Merseyside
Locality: birkenhead
Org Unit: Park Group PLC
Org: Valley Road
Issuer CN: uatflexecash.park.lan
Issuer Country: uk
Issuer State/Province: Merseyside
Issuer Locality: birkenhead
Issuer Org: Park Group PLC
Issuer Org Unit: Valley Road
Version: 3
not before: 20161101091150
Unknown Field: 09:11:50 01-11-2016
not after: 20260118091150
Unknown Field: 09:11:50 18-01-2026
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field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
Unknown Field: 2048
Unknown Field: D6DDA66646FB208C03203D3059AA3945
Unknown Field: 1.2.840.113549.2.5
Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD
Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4
Unknown Field: 1
2020-03-17-14.31.31.879000: Protocol Used: TLS Version 1.2
2020-03-17-14.31.31.879000: http_persist_post(): entered
2020-03-17-14.31.31.879000: http_persist_req(POST) entered.
2020-03-17-14.31.31.880000: http_long_ParseURL(): entered
2020-03-17-14.31.31.880000: http_long_ParseURL(): entered
2020-03-17-14.31.31.880000: do_oper(POST): entered
2020-03-17-14.31.31.880000: There are 1 cookies in the cache
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=353
POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1
Host: uatflexecash.park.lan:9443
User-Agent: http-api/1.39
Content-Type: text/xml;charset=UTF-8
SOAPAction: ""
Content-Length: 943
Cookie: $Version=0; TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; $Path=/;
2020-03-17-14.31.31.880000: senddoc(): entered
2020-03-17-14.31.31.880000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0
2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943
<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>
2020-03-17-14.31.31.880000: senddoc(): comm_blockWrite returned 943
2020-03-17-14.31.31.880000: recvresp(): entered
2020-03-17-14.31.31.880000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32750
Content-Type: text/xml; charset=UTF-8
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32711
Content-Language: en-US
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32686
Date: Tue, 17 Mar 2020 14:32:33 GMT
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32649
Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32510
Transfer-Encoding: chunked
2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32482
2020-03-17-14.31.31.928000: recvresp: empty line, ending header, number of eol chars=2
2020-03-17-14.31.31.929000: recvresp: header resp code = 200 repeating=0
2020-03-17-14.31.31.929000: SetError() #13: HTTP/1.1 200 OK
2020-03-17-14.31.31.929000: recvresp(): end with 200
2020-03-17-14.31.31.929000: recvdoc parms: chunked 0
2020-03-17-14.31.31.929000: header_load_cookies() entered
2020-03-17-14.31.31.929000: cookie_parse() entered
2020-03-17-14.31.31.929000: cookie = TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/
2020-03-17-14.31.31.929000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c
2020-03-17-14.31.31.929000: cookie attr Path=/
2020-03-17-14.31.31.929000: recvchunk(): entered
2020-03-17-14.31.31.929000: get_chunk_size(): entered
242
2020-03-17-14.31.31.929000: chunk size = 578
2020-03-17-14.31.31.929000: get_chunk_size returned 578
2020-03-17-14.31.31.929000: calling comm_blockread
<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>
2020-03-17-14.31.31.929000: comm_blockread returned 578
2020-03-17-14.31.31.929000: get_chunk_size(): entered
0
2020-03-17-14.31.31.929000: chunk size = 0
2020-03-17-14.31.31.929000: get_chunk_size returned 0
2020-03-17-14.31.31.929000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0
2020-03-17-14.31.33.192000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0
Kevin Bucknum
Senior Programmer Analyst
MEDDATA / MEDTRON
120 Innwood Drive
Covington LA 70433
Local: 985-893-2550
Toll Free: 877-893-2550
https://www.medtronsoftware.com
CONFIDENTIALITY NOTICE
This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged. This information is intended only for the use of the individual or entity named above. The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled. If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED. If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.
Kevin Bucknum
Senior Programmer Analyst
MEDDATA / MEDTRON
120 Innwood Drive
Covington LA 70433
Local: 985-893-2550
Toll Free: 877-893-2550
https://www.medtronsoftware.com
CONFIDENTIALITY NOTICE
This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged. This information is intended only for the use of the individual or entity named above. The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled. If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED. If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.
_______________________________________________
Ftpapi mailing list
Ftpapi@xxxxxxxxxxxxxxxxxxxxxx
http://scottklement.com/mailman/listinfo/ftpapi
-- _______________________________________________ Ftpapi mailing list Ftpapi@xxxxxxxxxxxxxxxxxxxxxx http://scottklement.com/mailman/listinfo/ftpapi