[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Ftpapi] Another HTTPAPI log question



The blue and the first green are just reading the configuration of SSL on your box. Between the first green and the dump of the local certificate, HTTPAPI calls the system functions to initialize SSL as a client. I suspect that it is the call to gsk_environment_init that is your delay, but I'm not sure how that could be speed up. I just ran a quick test and I'm almost 1/2 a second. This is on a 9009-41A running with 5 cores.

2020-03-17-11.01.27.751000: TLS version 1.2 support enabled            
2020-03-17-11.01.28.203000: -------------------------------------------
2020-03-17-11.01.28.203000: Dump of local-side certificate information:


On Tue, 2020-03-17 at 15:27 +0000, Lawrence Loz wrote:
Hi,

Thanks for your previous replies. I'm currently getting the WEB servers developers to check their timings, as they also call another external webservice, it could be down to that.

I have another similar problem, but the holdup is in a different portion of the HTTPAPI log, again only on the 1st call to another internal webservice on a different server. The trouble is I don't know what the additional piece of 1st time process is doing, and what can be done to reduce/remove it?

I've highlighted the additional parts in the 1st run in blue and green, the time issue seems to be in the bit in green?

Thanks 🙂

1st run

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.27.670000: http_persist_open(): entered

2020-03-17-14.31.27.691000: http_long_ParseURL(): entered

2020-03-17-14.31.27.691000: DNS resolver retrans: 2

2020-03-17-14.31.27.691000: DNS resolver retry  : 2

2020-03-17-14.31.27.691000: DNS resolver options: x'00000136'

2020-03-17-14.31.27.692000: DNS default domain: PARK.LAN

2020-03-17-14.31.27.692000: DNS server found: 10.1.2.15

2020-03-17-14.31.27.692000: DNS server found: 10.1.2.16

2020-03-17-14.31.27.695000: https_init(): entered

2020-03-17-14.31.27.696000: QSSLPCL = *OPSYS

2020-03-17-14.31.27.696000: SSL version 2 support disabled

2020-03-17-14.31.27.696000: SSL version 3 support disabled

2020-03-17-14.31.27.696000: Old interface to TLS version 1.0 support enabled

2020-03-17-14.31.27.696000: TLS version 1.0 support enabled

2020-03-17-14.31.27.696000: TLS version 1.1 support enabled

2020-03-17-14.31.27.696000: TLS version 1.2 support enabled

2020-03-17-14.31.28.854000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.855000: Dump of local-side certificate information:

2020-03-17-14.31.28.855000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.855000: Nagle's algorithm (TCP_NODELAY) disabled.

2020-03-17-14.31.28.855000: SNI hostname set to: uatflexecash.park.lan

2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.869000: Dump of server-side certificate information:

2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.869000: Cert Validation Code = 0

2020-03-17-14.31.28.902000: -----BEGIN CERTIFICATE-----

MIID4TCCAsmgAwIBAgIJANax6Zu1+6xSMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD

VQQGEwJ1azETMBEGA1UECAwKTWVyc2V5c2lkZTETMBEGA1UEBwwKYmlya2VuaGVh

ZDEXMBUGA1UECgwOUGFyayBHcm91cCBQTEMxFDASBgNVBAsMC1ZhbGxleSBSb2Fk

MR4wHAYDVQQDDBV1YXRmbGV4ZWNhc2gucGFyay5sYW4wHhcNMTYxMTAxMDkxMTUw

WhcNMjYwMTE4MDkxMTUwWjCBhjELMAkGA1UEBhMCdWsxEzARBgNVBAgMCk1lcnNl

eXNpZGUxEzARBgNVBAcMCmJpcmtlbmhlYWQxFzAVBgNVBAoMDlBhcmsgR3JvdXAg

UExDMRQwEgYDVQQLDAtWYWxsZXkgUm9hZDEeMBwGA1UEAwwVdWF0ZmxleGVjYXNo

LnBhcmsubGFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3Mri8o2G

wZRS6zZ5HIZY5L1zuVDow+G3ugOq2bFH7GaRaHyIKeiZqoyIpTRzegCavDCxsNQV

kenscNSp+7cjyOVE/mEO5XRA6C7uw+rEYkLYGuEC0ypl+YFGISMjnUccbvl/2gvk

8JhbBCC+X7Iw7A624NK1a/Knii9RaMuIFyJ21yL84bSjx+9qSqmeWuGIVCSn5QnM

eQGuoPsfqXTqRNP9ntksi1VRkOr8YivzBFBjfFYsIQSKhtiyFZsr/6tdXPO6/SWR

Mc5g/tY5B8WvQgec+Y+jgZ1naKQspSyuChgT70bzG802+IaS3s0Vcc3u5fN6FTHm

mADsmy+1gqEVxwIDAQABo1AwTjAdBgNVHQ4EFgQUOiQGkidtTVe3j7V5UI5UDGRC

aMIwHwYDVR0jBBgwFoAUOiQGkidtTVe3j7V5UI5UDGRCaMIwDAYDVR0TBAUwAwEB

/zANBgkqhkiG9w0BAQsFAAOCAQEABdavDLf4795AG7FovIl+m4zP/ou+AtbfCWqQ

v+iHjClVM19/vJYp3HiIuUIk3cgowlVJNPYLqow5Mv5OcXfjwsQGWlF7dLoubX0S

pfuQDKgvZKX5qK7GGtll4TtEqyt1M9j3s5Q+D5carym/xl1kiO1IWLoiBsCjDqvc

fg3Y/lGzicMZU9iiAh9eW9Cp5xH/vylg1j8jhH0Zzjt5z41TPb4ojxuwqSHhvJ48

n95IDAgmwdb552+UFxAR7S5nikL9hqbczMXv7Qmdf1rBrwX+oJTpvUx8ehyO0ety

zm9ug0he/zyWeiwyEBDpujaHVOjFOsM665QomctvUfwvURiyfg==

2020-03-17-14.31.28.902000: -----END CERTIFICATE-----

Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52

Common Name: uatflexecash.park.lan

Country: uk

State/Province: Merseyside

Locality: birkenhead

Org Unit: Park Group PLC

Org: Valley Road

Issuer CN: uatflexecash.park.lan

Issuer Country: uk

Issuer State/Province: Merseyside

Issuer Locality: birkenhead

Issuer Org: Park Group PLC

Issuer Org Unit: Valley Road

Version: 3

not before: 20161101091150

Unknown Field: 09:11:50 01-11-2016

not after: 20260118091150

Unknown Field: 09:11:50 18-01-2026

pub key alg: 1.2.840.113549.1.1.1

signature algorithm: 1.2.840.113549.1.1.11

Unknown Field: 0382010F003082010A0282010100DCCAE2F28D86C19452EB36791C8658E4BD73B950E8C3E1B7BA03AAD9B147EC6691687C8829E899AA8C88A534737A009ABC30B1B0D41591E9EC70D4A9FBB723C8E544FE610EE57440E82EEEC3EAC46242D81AE102D32A65F981462123239D471C6EF97FDA0BE4F0985B0420BE5FB230EC0EB6E0D2B56BF2A78A2F5168CB88172276D722FCE1B4A3C7EF6A4AA99E5AE1885424A7E509CC7901AEA0FB1FA974EA44D3FD9ED92C8B555190EAFC622BF30450637C562C21048A86D8B2159B2BFFAB5D5CF3BAFD259131CE60FED63907C5AF42079CF98FA3819D6768A42CA52CAE0A1813EF46F31BCD36F88692DECD1571CDEEE5F37A1531E69800EC9B2FB582A115C70203010001

Unknown Field: 2048

Unknown Field: D6DDA66646FB208C03203D3059AA3945

Unknown Field: 1.2.840.113549.2.5

Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD

Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4

Unknown Field: 1

 

2020-03-17-14.31.28.904000: Protocol Used: TLS Version 1.2

2020-03-17-14.31.28.904000: http_persist_post(): entered

2020-03-17-14.31.28.904000: http_persist_req(POST) entered.

2020-03-17-14.31.28.904000: http_long_ParseURL(): entered

2020-03-17-14.31.28.904000: http_long_ParseURL(): entered

2020-03-17-14.31.28.905000: do_oper(POST): entered

2020-03-17-14.31.28.905000: There are 0 cookies in the cache

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=204

POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1

Host: uatflexecash.park.lan:9443

User-Agent: http-api/1.39

Content-Type: text/xml;charset=UTF-8

SOAPAction: ""

Content-Length: 943

 

 

2020-03-17-14.31.28.905000: senddoc(): entered

2020-03-17-14.31.28.905000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943

<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>

2020-03-17-14.31.28.905000: senddoc(): comm_blockWrite returned 943

2020-03-17-14.31.28.906000: recvresp(): entered

2020-03-17-14.31.28.906000: recvresp: reading response header, space left=32767

HTTP/1.1 200 OK

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32750

Content-Type: text/xml; charset=UTF-8

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32711

Content-Language: en-US

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32686

Date: Tue, 17 Mar 2020 14:32:30 GMT

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32649

Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32510

Transfer-Encoding: chunked

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32482

 

 

2020-03-17-14.31.28.965000: recvresp: empty line, ending header, number of eol chars=2

2020-03-17-14.31.28.965000: recvresp: header resp code = 200  repeating=0

2020-03-17-14.31.28.965000: SetError() #13: HTTP/1.1 200 OK

2020-03-17-14.31.28.965000: recvresp(): end with 200

2020-03-17-14.31.28.965000: recvdoc parms: chunked 0

2020-03-17-14.31.28.965000: header_load_cookies() entered

2020-03-17-14.31.28.965000: cookie_parse() entered

2020-03-17-14.31.28.965000: cookie =  TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

2020-03-17-14.31.28.965000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c

2020-03-17-14.31.28.965000: cookie attr Path=/

2020-03-17-14.31.28.965000: recvchunk(): entered

2020-03-17-14.31.28.965000: get_chunk_size(): entered

242

 

2020-03-17-14.31.28.966000: chunk size = 578

2020-03-17-14.31.28.966000: get_chunk_size returned 578

2020-03-17-14.31.28.966000: calling comm_blockread

<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>

2020-03-17-14.31.28.966000: comm_blockread returned 578

 

 

2020-03-17-14.31.28.966000: get_chunk_size(): entered

0

 

2020-03-17-14.31.28.966000: chunk size = 0

2020-03-17-14.31.28.966000: get_chunk_size returned 0

2020-03-17-14.31.28.966000: http_close(): entered

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.31.857000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0

 

2nd run

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.31.859000: http_persist_open(): entered

2020-03-17-14.31.31.862000: http_long_ParseURL(): entered

2020-03-17-14.31.31.862000: DNS resolver retrans: 2

2020-03-17-14.31.31.862000: DNS resolver retry  : 2

2020-03-17-14.31.31.862000: DNS resolver options: x'00000136'

2020-03-17-14.31.31.862000: DNS default domain: PARK.LAN

2020-03-17-14.31.31.862000: DNS server found: 10.1.2.15

2020-03-17-14.31.31.862000: DNS server found: 10.1.2.16

2020-03-17-14.31.31.863000: Nagle's algorithm (TCP_NODELAY) disabled.

2020-03-17-14.31.31.863000: SNI hostname set to: uatflexecash.park.lan

2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------

2020-03-17-14.31.31.864000: Dump of server-side certificate information:

2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------

2020-03-17-14.31.31.864000: Cert Validation Code = 0

2020-03-17-14.31.31.878000: -----BEGIN CERTIFICATE-----

MIID4TCCAsmgAwIBAgIJANax6Zu1+6xSMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD

VQQGEwJ1azETMBEGA1UECAwKTWVyc2V5c2lkZTETMBEGA1UEBwwKYmlya2VuaGVh

ZDEXMBUGA1UECgwOUGFyayBHcm91cCBQTEMxFDASBgNVBAsMC1ZhbGxleSBSb2Fk

MR4wHAYDVQQDDBV1YXRmbGV4ZWNhc2gucGFyay5sYW4wHhcNMTYxMTAxMDkxMTUw

WhcNMjYwMTE4MDkxMTUwWjCBhjELMAkGA1UEBhMCdWsxEzARBgNVBAgMCk1lcnNl

eXNpZGUxEzARBgNVBAcMCmJpcmtlbmhlYWQxFzAVBgNVBAoMDlBhcmsgR3JvdXAg

UExDMRQwEgYDVQQLDAtWYWxsZXkgUm9hZDEeMBwGA1UEAwwVdWF0ZmxleGVjYXNo

LnBhcmsubGFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3Mri8o2G

wZRS6zZ5HIZY5L1zuVDow+G3ugOq2bFH7GaRaHyIKeiZqoyIpTRzegCavDCxsNQV

kenscNSp+7cjyOVE/mEO5XRA6C7uw+rEYkLYGuEC0ypl+YFGISMjnUccbvl/2gvk

8JhbBCC+X7Iw7A624NK1a/Knii9RaMuIFyJ21yL84bSjx+9qSqmeWuGIVCSn5QnM

eQGuoPsfqXTqRNP9ntksi1VRkOr8YivzBFBjfFYsIQSKhtiyFZsr/6tdXPO6/SWR

Mc5g/tY5B8WvQgec+Y+jgZ1naKQspSyuChgT70bzG802+IaS3s0Vcc3u5fN6FTHm

mADsmy+1gqEVxwIDAQABo1AwTjAdBgNVHQ4EFgQUOiQGkidtTVe3j7V5UI5UDGRC

aMIwHwYDVR0jBBgwFoAUOiQGkidtTVe3j7V5UI5UDGRCaMIwDAYDVR0TBAUwAwEB

/zANBgkqhkiG9w0BAQsFAAOCAQEABdavDLf4795AG7FovIl+m4zP/ou+AtbfCWqQ

v+iHjClVM19/vJYp3HiIuUIk3cgowlVJNPYLqow5Mv5OcXfjwsQGWlF7dLoubX0S

pfuQDKgvZKX5qK7GGtll4TtEqyt1M9j3s5Q+D5carym/xl1kiO1IWLoiBsCjDqvc

fg3Y/lGzicMZU9iiAh9eW9Cp5xH/vylg1j8jhH0Zzjt5z41TPb4ojxuwqSHhvJ48

n95IDAgmwdb552+UFxAR7S5nikL9hqbczMXv7Qmdf1rBrwX+oJTpvUx8ehyO0ety

zm9ug0he/zyWeiwyEBDpujaHVOjFOsM665QomctvUfwvURiyfg==

2020-03-17-14.31.31.878000: -----END CERTIFICATE-----

Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52

Common Name: uatflexecash.park.lan

Country: uk

State/Province: Merseyside

Locality: birkenhead

Org Unit: Park Group PLC

Org: Valley Road

Issuer CN: uatflexecash.park.lan

Issuer Country: uk

Issuer State/Province: Merseyside

Issuer Locality: birkenhead

Issuer Org: Park Group PLC

Issuer Org Unit: Valley Road

Version: 3

not before: 20161101091150

Unknown Field: 09:11:50 01-11-2016

not after: 20260118091150

Unknown Field: 09:11:50 18-01-2026

pub key alg: 1.2.840.113549.1.1.1

signature algorithm: 1.2.840.113549.1.1.11

Unknown Field: 0382010F003082010A0282010100DCCAE2F28D86C19452EB36791C8658E4BD73B950E8C3E1B7BA03AAD9B147EC6691687C8829E899AA8C88A534737A009ABC30B1B0D41591E9EC70D4A9FBB723C8E544FE610EE57440E82EEEC3EAC46242D81AE102D32A65F981462123239D471C6EF97FDA0BE4F0985B0420BE5FB230EC0EB6E0D2B56BF2A78A2F5168CB88172276D722FCE1B4A3C7EF6A4AA99E5AE1885424A7E509CC7901AEA0FB1FA974EA44D3FD9ED92C8B555190EAFC622BF30450637C562C21048A86D8B2159B2BFFAB5D5CF3BAFD259131CE60FED63907C5AF42079CF98FA3819D6768A42CA52CAE0A1813EF46F31BCD36F88692DECD1571CDEEE5F37A1531E69800EC9B2FB582A115C70203010001

Unknown Field: 2048

Unknown Field: D6DDA66646FB208C03203D3059AA3945

Unknown Field: 1.2.840.113549.2.5

Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD

Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4

Unknown Field: 1

 

2020-03-17-14.31.31.879000: Protocol Used: TLS Version 1.2

2020-03-17-14.31.31.879000: http_persist_post(): entered

2020-03-17-14.31.31.879000: http_persist_req(POST) entered.

2020-03-17-14.31.31.880000: http_long_ParseURL(): entered

2020-03-17-14.31.31.880000: http_long_ParseURL(): entered

2020-03-17-14.31.31.880000: do_oper(POST): entered

2020-03-17-14.31.31.880000: There are 1 cookies in the cache

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=353

POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1

Host: uatflexecash.park.lan:9443

User-Agent: http-api/1.39

Content-Type: text/xml;charset=UTF-8

SOAPAction: ""

Content-Length: 943

Cookie: $Version=0; TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; $Path=/;

 

 

2020-03-17-14.31.31.880000: senddoc(): entered

2020-03-17-14.31.31.880000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943

<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>

2020-03-17-14.31.31.880000: senddoc(): comm_blockWrite returned 943

2020-03-17-14.31.31.880000: recvresp(): entered

2020-03-17-14.31.31.880000: recvresp: reading response header, space left=32767

HTTP/1.1 200 OK

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32750

Content-Type: text/xml; charset=UTF-8

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32711

Content-Language: en-US

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32686

Date: Tue, 17 Mar 2020 14:32:33 GMT

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32649

Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32510

Transfer-Encoding: chunked

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32482

 

 

2020-03-17-14.31.31.928000: recvresp: empty line, ending header, number of eol chars=2

2020-03-17-14.31.31.929000: recvresp: header resp code = 200  repeating=0

2020-03-17-14.31.31.929000: SetError() #13: HTTP/1.1 200 OK

2020-03-17-14.31.31.929000: recvresp(): end with 200

2020-03-17-14.31.31.929000: recvdoc parms: chunked 0

2020-03-17-14.31.31.929000: header_load_cookies() entered

2020-03-17-14.31.31.929000: cookie_parse() entered

2020-03-17-14.31.31.929000: cookie =  TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

2020-03-17-14.31.31.929000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c

2020-03-17-14.31.31.929000: cookie attr Path=/

2020-03-17-14.31.31.929000: recvchunk(): entered

2020-03-17-14.31.31.929000: get_chunk_size(): entered

242

 

2020-03-17-14.31.31.929000: chunk size = 578

2020-03-17-14.31.31.929000: get_chunk_size returned 578

2020-03-17-14.31.31.929000: calling comm_blockread

<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>

2020-03-17-14.31.31.929000: comm_blockread returned 578

 

 

2020-03-17-14.31.31.929000: get_chunk_size(): entered

0

 

2020-03-17-14.31.31.929000: chunk size = 0

2020-03-17-14.31.31.929000: get_chunk_size returned 0

2020-03-17-14.31.31.929000: http_close(): entered

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.33.192000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0

 




  Kevin  Bucknum
                   Senior Programmer Analyst
                   MEDDATA / MEDTRON
                   120 Innwood Drive
                   Covington LA 70433
                   Local: 985-893-2550
                   Toll Free: 877-893-2550
                 https://www.medtronsoftware.com



CONFIDENTIALITY NOTICE

This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged.  This information is intended only for the use of the individual or entity named above.  The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled.  If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED.  If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.

-- 
_______________________________________________
Ftpapi mailing list
Ftpapi@xxxxxxxxxxxxxxxxxxxxxx
http://scottklement.com/mailman/listinfo/ftpapi