Hi, update httpapi to version 1.41. Will most likely solve the problem. /Stefan Sent from a stupid smartphone excuse my brevity -------- Original message -------- From: Gerald Magnuson <gmagnuson@xxxxxxxxxxxxx> Date: 08/09/2020 17:42 (GMT+01:00) To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx Subject: [Ftpapi] just upgraded os from 7.3 to 7.4, sporadic "Peer not recognized or badly formatted message received" Failing at no known frequency.
The request:
http_setauth(HTTP_AUTH_BASIC:userid: pass) ;
rc=http_url_post_raw( 'https://xxxxxl.xxxxxxxxx.com/xxxxxxxxxxxxx/Rate' : myPointer: dataSize : 1: %paddr('INCOMING') :HTTP_TIMEOUT :HTTP_USERAGENT : 'application/x-www-form-urlencoded' );
Bad call/return: ************Beginning of data************** HTTPAPI Ver 1.24 released 2012-01-23 OS/400 Ver V7R4M0
http_setauth(): entered http_persist_open(): entered http_long_ParseURL(): entered DNS resolver retrans: 2 DNS resolver retry : 4 DNS resolver options: x'00000136' DNS default domain: knapheide.com DNS server found: 10.129.5.50 DNS server found: 10.129.5.51 (GSKit) Peer not recognized or badly formatted message received. ssl_error(415): (GSKit) Peer not recognized or badly formatted message received. SetError() #30: SSL Handshake: (GSKit) Peer not recognized or badly formatted message received. ------------------------------------------------------------------------------------- Dump of server-side certificate information: ------------------------------------------------------------------------------------- Cert Validation Code = 0 (GSKit) An operation which is not valid for the current TLS session state was attempted. ssl_error(5): (GSKit) An operation which is not valid for the current TLS session state was attempted. (GSKit) An operation which is not valid for the current TLS session state was attempted. ************End of Data********************
Good call/ return: ************Beginning of data************** HTTPAPI Ver 1.24 released 2012-01-23 OS/400 Ver V7R4M0
http_setauth(): entered http_persist_open(): entered http_long_ParseURL(): entered DNS resolver retrans: 2 DNS resolver retry : 4 DNS resolver options: x'00000136' DNS default domain: knapheide.com DNS server found: 10.129.5.50 DNS server found: 10.129.5.51 ------------------------------------------------------------------------------------- Dump of server-side certificate information: ------------------------------------------------------------------------------------- Cert Validation Code = 0 -----BEGIN CERTIFICATE----- MIIGtjCCBZ6gAwIBAgIJAJ7pmqTOY03BMA0GCSqGSIb3DQEBCwUAMIG0MQswCQYD aYM4BxzkfMkU/zIgzWQhErEJEUaBaz5Rj03LgrxnEXDKwWTLav5psD6qro2Ropty OpVYJToyTdBce5tZIFSgRE47YfwzwceCiNBqTbmyk91BH4Dk+Z54/TYWNeSaNyyH 2kBVrV9W8HVEqpEkWZL2Za5bZPADPdUSBazDJOlRsEFlH9twULMylQr9yWM02fbF pWiQr+ZDzCJNNk1I/J0BdcLcsKi62cdRoK9LplfZJeVfonib4TCP4FiJhDmtvImR AnR5rSdDoGbr5n6JSQy/oZ3qfq/Z/DO/r1YA/SOWrMhN4xND/4ZelFq6 -----END CERTIFICATE----- Serial Number: 00:9E:Q7:9A:A4:CE:63:4D:ZZ Common Name: *.knapheide.com Org: Domain Control Validated Issuer CN: Go Daddy Secure Certificate Authority - G2 Issuer Country: US Issuer State/Province: Arizona Issuer Locality: Scottsdale Issuer Org: GoDaddy.com, Inc. Issuer Org Unit: http://certs.godaddy.com/repository/ Version: 3 not before: 20200818092441 Unknown Field: 09:24:41 18-08-2020 not after: 20220822105111 Unknown Field: 10:51:11 22-08-2022 pub key alg: 1.2.840.113549.1.1.1 signature algorithm: 1.2.840.113549.1.1.11 Unknown Field: 0382010F003082010A0282010100AB89FDBCAA9D72E8007F5BE56D6602D0BB4BFD6BA9C724198C6F296CE7AE9C93E8FF78610DF Unknown Field: 2048 Unknown Field: D13C16CAA4585B18C779DCD91695E9C6 Unknown Field: 1.2.840.113549.2.5 Unknown Field: 2D76740C36822DF9A90CEFCDC5153C7C8FBE9DE1 Unknown Field: 157DB2A0AFD464CFC53C79D5BCE11E2B3D5A6CEAE55279BD1CC0C8861A924BB2 Unknown Field: 5 Unknown Field: *.knapheide.com Unknown Field: 0 Unknown Field: 1.3.6.1.5.5.7.3.2 Unknown Field: 1.3.6.1.5.5.7.3.1 Unknown Field: 2.23.140.1.2.1 Unknown Field: 2.16.840.1.114413.1.7.23.1 Unknown Field: http://ocsp.godaddy.com/
SetError() #49: SSL_protocol: Unknown protocol 5000 Protocol Used: http_persist_post(): entered http_persist_req(POST) entered. http_long_ParseURL(): entered do_oper(POST): entered There are 1 cookies in the cache POST /xxxxxxxxxxxxxx/Rate HTTP/1.1 Host: xxxxxl.xxxxxxxxxxxx.com User-Agent: http-api/1.24 Content-Type: application/x-www-form-urlencoded Content-Length: 8 Authorization: Basic YXBpLnBheXJvbGwucmF0ZTpKTWNTdHJmV1FieDU1R3JTQTFKd0hTNVFkc2dmRg== Cookie: $Version=0; KnapheidePayrollSystem=f44qefeuv5mbmhfpjtlmd51h13; $Path=/KnapheidePayrollSystem;
senddoc(): entered id=23337 recvresp(): entered HTTP/1.1 200 OK Server: nginx Content-Type: application/json Transfer-Encoding: chunked X-Powered-By: PHP/7.1.8 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Cache-Control: no-cache, private Date: Tue, 08 Sep 2020 15:29:26 GMT
SetError() #13: HTTP/1.1 200 OK recvresp(): end with 200 recvdoc parms: chunked 0 header_load_cookies() entered recvchunk(): entered get_chunk_size(): entered 15
chunk size = 21 get_chunk_size returned 21 calling comm_blockread {"Rate":"18.0300"} comm_blockread returned 21
get_chunk_size(): entered 0
chunk size = 0 get_chunk_size returned 0 http_close(): entered ************End of Data********************
|
-- _______________________________________________ Ftpapi mailing list Ftpapi@xxxxxxxxxxxxxxxxxxxxxx http://scottklement.com/mailman/listinfo/ftpapi