Application Delivery Management
Application Modernization & Connectivity
CyberRes by OpenText
IT Operations Management
16:32:28 8ED365A0 PKI: Entering openCRLDataBase with NULL for CRLConfigDN
16:32:28 8ED365A0 PKI: openCRLDataBase: FlmDbOpen 0
16:32:28 8ED365A0 PKI: copyCAToCRLConfig: Unable to read the CRL Configuration DN List (-603)
16:32:28 8ED365A0 PKI: GetCRLConfigDNList:missing or invalid ndspkiCRLConfigurationDNList attribute(-603)
16:32:28 8ED365A0 PKI: NICI MU CA validFrom 34AC2DC4 -- Thu Jan 1 23:59:00 1998
16:32:28 8ED365A0 PKI: NICI MU CA validTo 7C5131C4 -- Sun Feb 3 23:59:00 2036
16:32:28 8ED365A0 PKI: Orginizational CA validFrom 3BB3569C -- Thu Sep 27 16:41:00 2001
16:32:28 8ED365A0 PKI: Orginizational CA validTo 4E8218BC -- Tue Sep 27 18:41:00 2011
16:32:28 8ED365A0 PKI: Subordinate CA validFrom 0 -- Thu Jan 1 00:00:00 1970
16:32:28 8ED365A0 PKI: Subordinate CA validTo 0 -- Thu Jan 1 00:00:00 1970
16:32:28 8ED365A0 PKI: AllocCriticalSectionMutex: Error = 0
16:32:28 8ED365A0 PKI: AllocCriticalSectionMutex: Error = 0
16:32:28 8ED365A0 PKI: Entering openCRLDataBase with NULL for CRLConfigDN
16:32:28 8ED365A0 PKI: openCRLDataBase: FlmDbOpen 0
16:32:28 8ED365A0 PKI: Need to create new CRL any 0 this #0
16:32:28 8ED365A0 PKI: Entering GetCRLConfigDNList
16:32:28 8ED365A0 PKI: Entering PKI_GetWorkingCAs
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCADN = Acme CA.Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:32:28 8ED365A0 PKI: Entering copySSCertificate: (0)
16:32:28 8ED365A0 PKI: Exiting copySSCertificate: (-614)
16:32:28 8ED365A0 PKI: Entering copyCAToCRLConfig: (0)
16:32:28 8ED365A0 PKI: copyCAToCRLConfig: Unable to read the CRL Configuration DN List (-603)
16:32:28 8ED365A0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:32:28 8ED365A0 PKI: Trying to resolve to Acme CA.Security
16:32:28 8ED365A0 PKI: Trying to resolve to Acme CA.Security
16:32:28 8ED365A0 PKI: GetCRLConfigDNList:missing or invalid ndspkiCRLConfigurationDNList attribute(-603)
16:32:28 8ED365A0 PKI: Cleaning up GetCRLConfigDNList
16:32:28 8ED365A0 PKI: openCRLDataBase: exiting with -603, crlIdentifier 0
16:32:28 8ED365A0 PKI: Create Context succeded from Startup
16:32:28 8ED365A0 PKI:
16:32:28 8ED365A0 PKI: PKMAIN.C was compiled Aug 15 2007 at 18:24:59
16:32:28 8ED365A0 PKI: NLM Handle = 0x8F54DB00
16:32:28 8ED365A0 PKI: NLM ID = 0x000000A6
16:32:28 8ED365A0 PKI: Thread Group ID = 0x000000F5
16:32:28 8ED365A0 PKI: Dclient Context Handle = 0x6F750002
16:32:28 8ED365A0 PKI: CCS/NICI module strength = 3 (domestic)
16:32:28 8ED365A0 PKI: Max RSA key size (from Xeng) = 4096 bits
16:32:28 8ED365A0 PKI: Max RSA key size (signing) = 4096 bits
16:32:28 8ED365A0 PKI: Max RSA key size (data enc.) = 4096 bits
16:32:28 8ED365A0 PKI: Max RSA key size (key enc.) = 4096 bits
16:32:28 8ED365A0 PKI: Entering PKI_GetWorkingCAs
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCADN = Acme CA.Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:32:28 8ED365A0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:32:28 8ED365A0 PKI: Working CAs mask = 1 (Tree Root CA)
16:32:28 8ED365A0 PKI: Entering PKI_ReadMachineUniqueCA()...
16:32:28 8ED365A0 PKI: PKI_ReadMachineUniqueCA() returned 0
16:32:28 8ED365A0 PKI: Entering x509Decode
16:32:28 8ED365A0 PKI: certDataLen 1114
16:32:28 8ED365A0 PKI: 1st check succeeded
16:32:28 8ED365A0 PKI: 2nd check succeeded
16:32:28 8ED365A0 PKI: curMax 1110
16:32:28 8ED365A0 PKI: 3rd check succeeded
16:32:28 8ED365A0 PKI: curMax 998
16:32:28 8ED365A0 PKI: 4th check succeeded
16:32:28 8ED365A0 PKI: Malloc succeeded
16:32:28 8ED365A0 PKI: Entering PKI_GetWorkingCAs
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCADN = Acme CA.Security
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:32:28 8ED365A0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:32:28 8ED365A0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:32:28 8ED365A0 PKI: Entering x509Decode
16:32:28 8ED365A0 PKI: certDataLen 1243
16:32:28 8ED365A0 PKI: 1st check succeeded
16:32:28 8ED365A0 PKI: 2nd check succeeded
16:32:28 8ED365A0 PKI: curMax 1239
16:32:28 8ED365A0 PKI: 3rd check succeeded
16:32:28 8ED365A0 PKI: curMax 1082
16:32:28 8ED365A0 PKI: 4th check succeeded
16:32:28 8ED365A0 PKI: Malloc succeeded
16:32:28 8ED365A0 PKI: NICI MU CA validFrom 34AC2DC4 -- Thu Jan 1 23:59:00 1998
16:32:28 8ED365A0 PKI: NICI MU CA validTo 7C5131C4 -- Sun Feb 3 23:59:00 2036
16:32:28 8ED365A0 PKI: Orginizational CA validFrom 3BB3569C -- Thu Sep 27 16:41:00 2001
16:32:28 8ED365A0 PKI: Orginizational CA validTo 4E8218BC -- Tue Sep 27 18:41:00 2011
16:32:28 8ED365A0 PKI: Subordinate CA validFrom 0 -- Thu Jan 1 00:00:00 1970
16:32:28 8ED365A0 PKI: Subordinate CA validTo 0 -- Thu Jan 1 00:00:00 1970
16:32:28 8ED365A0 PKI:
16:32:28 8ED365A0 PKI: _____________________________________________________________________________
16:32:28 8ED365A0 PKI: PKIHealthCheck -- PKI Server is version 3.30
16:32:28 8ED365A0 PKI: Compiled Aug 15 2007 at 18:24:56
16:32:28 8ED365A0 PKI: Run at: Mon Mar 2 21:32:28 2009
16:32:28 8ED365A0 PKI: _____________________________________________________________________________
16:32:28 8ED365A0 PKI: Organiztional CA DN: Acme CA.Security
16:32:28 8ED365A0 PKI: Step 0 Check if this server should be an SDI Key Server.
16:32:28 8ED365A0 PKI: Testing for keyfile -- SYS:\system\nici\nicisdi.key.
16:32:28 8ED365A0 PKI: keyfile size 493.
16:32:28 8ED365A0 PKI: This server is already in the list.
16:32:28 8ED365A0 PKI: Step 0 succeeded.
16:32:28 8ED365A0 PKI: Step 1 Verifying the Server's link to the SAS Service Object.
16:32:28 8ED365A0 PKI: Server 'ACME9.ACME' points to SAS Service object 'SAS Service - ACME9.ACME'
16:32:28 8ED365A0 PKI: Step 1 succeeded.
16:32:28 8ED365A0 PKI: Step 2 Verifying the SAS Service Object
16:32:28 8ED365A0 PKI: SAS Service object 'SAS Service - ACME9.ACME' is backlinked to server 'ACME9.ACME'.
16:32:28 8ED365A0 PKI: Step 2 succeeded.
16:32:28 8ED365A0 PKI: Step 3 Verifying the links to the KMOs
16:32:28 8ED365A0 PKI: Reading the links for SAS Service object 'SAS Service - ACME9.ACME'.
16:32:28 8ED365A0 PKI: --> No KMOs are linked to Service object 'SAS Service - ACME9.ACME'.
16:32:28 8ED365A0 PKI: Step 3 succeeded.
16:32:28 8ED365A0 PKI: Step 4 Verifying the KMOs
16:32:28 8ED365A0 PKI: ---> Testing KMO 'SSL CertificateIP - ACME09.ACME'.
16:32:28 8ED365A0 PKI: NotBefore 20071108210346
16:32:28 8ED365A0 PKI: NotAfter 20091107210346
16:32:28 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:28 8ED365A0 PKI: Rights check -- OK.
16:32:28 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'SSL CertificateIP - ACME09.ACME'.
16:32:28 8ED365A0 PKI: Private Key -- Failed.
16:32:28 8ED365A0 PKI: ---> Testing KMO 'SSL CertificateIP - ACME01.ACME'.
16:32:28 8ED365A0 PKI: NotBefore 20071108193329
16:32:28 8ED365A0 PKI: NotAfter 20091107193329
16:32:28 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:28 8ED365A0 PKI: Rights check -- OK.
16:32:28 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'SSL CertificateIP - ACME01.ACME'.
16:32:28 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: ---> Testing KMO 'SSL CertificateDNS - ACME09.ACME'.
16:32:29 8ED365A0 PKI: NotBefore 20071108210346
16:32:29 8ED365A0 PKI: NotAfter 20091107210346
16:32:29 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:29 8ED365A0 PKI: Rights check -- OK.
16:32:29 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'SSL CertificateDNS - ACME09.ACME'.
16:32:29 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: ---> Testing KMO 'SSL CertificateDNS - ACME01.ACME'.
16:32:29 8ED365A0 PKI: NotBefore 20071108193329
16:32:29 8ED365A0 PKI: NotAfter 20091107193329
16:32:29 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:29 8ED365A0 PKI: Rights check -- OK.
16:32:29 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'SSL CertificateDNS - ACME01.ACME'.
16:32:29 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: ---> Testing KMO 'IP AG 192\.168\.166\.33 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: NotBefore 20060326221739
16:32:29 8ED365A0 PKI: NotAfter 20080325221739
16:32:29 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:29 8ED365A0 PKI: Rights check -- OK.
16:32:29 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'IP AG 192\.168\.166\.33 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: ---> Testing KMO 'DNS AG ACME09 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: NotBefore 20060326221739
16:32:29 8ED365A0 PKI: NotAfter 20080325221739
16:32:29 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:29 8ED365A0 PKI: Rights check -- OK.
16:32:29 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'DNS AG ACME09 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: ---> Testing KMO 'DNS AG 192\.168\.166\.33 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: NotBefore 20060326221814
16:32:29 8ED365A0 PKI: NotAfter 20080325221814
16:32:29 8ED365A0 PKI: Successfully added NotBefore and NotAfter fields
16:32:29 8ED365A0 PKI: Rights check -- OK.
16:32:29 8ED365A0 PKI: ERROR -603 reading host server attributes for KMO 'DNS AG 192\.168\.166\.33 - ACME09.ACME'.
16:32:29 8ED365A0 PKI: Private Key -- Failed.
16:32:29 8ED365A0 PKI: Step 4 succeeded.
16:32:29 8ED365A0 PKI: Step 5 Re-verifying the links to the KMOs
16:32:29 8ED365A0 PKI: INFO: kmo SSL CertificateIP - ACME09.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo SSL CertificateIP - ACME01.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo SSL CertificateDNS - ACME09.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo SSL CertificateDNS - ACME01.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo IP AG 192\.168\.166\.33 - ACME09.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo DNS AG ACME09 - ACME09.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: INFO: kmo DNS AG 192\.168\.166\.33 - ACME09.ACME is not back linked to any server. It should probably be deleted.
16:32:29 8ED365A0 PKI: Step 5 succeeded.
16:32:29 8ED365A0 PKI: Step 6 Create Default Certificates
16:32:29 8ED365A0 PKI: Server Self-Provisioning is NOT enabled, so we cannot create certificates.
16:32:29 8ED365A0 PKI: Step 6 succeeded.
16:32:29 8ED365A0 PKI: Step 7 Checking validity of RootCert.der in SYS:\Public
16:32:29 8ED365A0 PKI: Read SYS:\public\rootcert.der -- 1303 bytes.
16:32:29 8ED365A0 PKI: Read CA certificate of length 1303.
16:32:29 8ED365A0 PKI: RootCert.der matchs the CA's certificate.
16:32:29 8ED365A0 PKI: Step 7 succeeded.
16:32:29 8ED365A0 PKI: Note: Occasionally multiple problems will be solved with a single fix.
16:32:29 8ED365A0 PKI: Fixable problems found: 0
16:32:29 8ED365A0 PKI: Problems fixed: 0
16:32:29 8ED365A0 PKI: Un-fixable problems found: 0
16:32:29 8ED365A0 PKI: Staying resident ...
16:32:29 8ED365A0 PKI:
16:32:29 8ED365A0 PKI:
16:32:29 8ED365A0 PKI: Country ID = 2949164
16:32:29 8ED365A0 PKI: Code page = 65973
17:19:58 85BD6040 PKI: PKI_ReadCAPrivateKey: Unable to load CA private key (-1418)
17:19:58 85BD6040 PKI: SC: err from PKI_GenerateCertificateFromCSR = -1418
17:19:58 85BD6040 PKI: PKIVerbHandOff returned -1418
17:19:58 85BD6040 PKI: Exiting PKIVerbHandOff rc = -1418
17:19:58 85BD6040 PKI: Exiting PKIWireRequest err = -1418
17:19:58 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:58 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:58 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:19:58 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:19:58 85BD6040 PKI: Entering x509Decode
17:19:58 85BD6040 PKI: certDataLen 1114
17:19:58 85BD6040 PKI: 1st check succeeded
17:19:58 85BD6040 PKI: 2nd check succeeded
17:19:58 85BD6040 PKI: curMax 1110
17:19:58 85BD6040 PKI: 3rd check succeeded
17:19:58 85BD6040 PKI: curMax 998
17:19:58 85BD6040 PKI: 4th check succeeded
17:19:58 85BD6040 PKI: Malloc succeeded
17:19:58 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:58 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:58 85BD6040 PKI: Entering x509Decode
17:19:58 85BD6040 PKI: certDataLen 1243
17:19:58 85BD6040 PKI: 1st check succeeded
17:19:58 85BD6040 PKI: 2nd check succeeded
17:19:58 85BD6040 PKI: curMax 1239
17:19:58 85BD6040 PKI: 3rd check succeeded
17:19:58 85BD6040 PKI: curMax 1082
17:19:58 85BD6040 PKI: 4th check succeeded
17:19:58 85BD6040 PKI: Malloc succeeded
17:20:01 85BD6040 PKI: Entering PKIWireRequest
17:20:01 85BD6040 PKI: Entering PKIVerbHandOff
17:20:01 85BD6040 PKI: PKIVerbHandOff calling verb 4
17:20:01 85BD6040 PKI: SC: v-3
17:20:01 85BD6040 PKI: cl-945 data-
17:20:01 85BD6040 PKI: SC: hashLen-128
17:20:01 85BD6040 PKI: numInChain-3
17:20:01 85BD6040 PKI: chainLen-3598
17:20:01 85BD6040 PKI: sa-4
17:20:01 85BD6040 PKI: dF-x0
17:20:01 85BD6040 PKI: vf-x49AC409E
17:20:01 85BD6040 PKI: vt-x4D6EA79E
17:20:01 85BD6040 PKI: SC: subjLen-26
17:20:01 85BD6040 PKI: subjDN-.O=NE_IDN.CN=192.168.1.201
17:20:01 85BD6040 PKI: SC: serverLen-14
17:20:01 85BD6040 PKI: serverDN-CN=ACME01.O=ACME
16:37:14 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:14 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:14 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:14 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:14 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:14 85A334E0 PKI: Entering PKI_ReadMachineUniqueCA()...
16:37:14 85A334E0 PKI: PKI_ReadMachineUniqueCA() returned 0
16:37:14 85A334E0 PKI: Entering x509Decode
16:37:14 85A334E0 PKI: certDataLen 1114
16:37:14 85A334E0 PKI: 1st check succeeded
16:37:14 85A334E0 PKI: 2nd check succeeded
16:37:14 85A334E0 PKI: curMax 1110
16:37:14 85A334E0 PKI: 3rd check succeeded
16:37:14 85A334E0 PKI: curMax 998
16:37:14 85A334E0 PKI: 4th check succeeded
16:37:14 85A334E0 PKI: Malloc succeeded
16:37:14 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:14 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:14 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:14 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:14 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:14 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:14 85A334E0 PKI: Entering x509Decode
16:37:14 85A334E0 PKI: certDataLen 1243
16:37:14 85A334E0 PKI: 1st check succeeded
16:37:14 85A334E0 PKI: 2nd check succeeded
16:37:14 85A334E0 PKI: curMax 1239
16:37:14 85A334E0 PKI: 3rd check succeeded
16:37:14 85A334E0 PKI: curMax 1082
16:37:14 85A334E0 PKI: 4th check succeeded
16:37:14 85A334E0 PKI: Malloc succeeded
16:37:15 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:15 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:15 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:15 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:15 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:15 85A334E0 PKI: Entering PKI_ReadMachineUniqueCA()...
16:37:15 85A334E0 PKI: PKI_ReadMachineUniqueCA() returned 0
16:37:15 85A334E0 PKI: Entering x509Decode
16:37:15 85A334E0 PKI: certDataLen 1114
16:37:15 85A334E0 PKI: 1st check succeeded
16:37:15 85A334E0 PKI: 2nd check succeeded
16:37:15 85A334E0 PKI: curMax 1110
16:37:15 85A334E0 PKI: 3rd check succeeded
16:37:15 85A334E0 PKI: curMax 998
16:37:15 85A334E0 PKI: 4th check succeeded
16:37:15 85A334E0 PKI: Malloc succeeded
16:37:15 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:15 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:15 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:15 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
Monday, Mar 2, 2009
16:37:15 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:15 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:15 85A334E0 PKI: Entering x509Decode
16:37:15 85A334E0 PKI: certDataLen 1243
16:37:15 85A334E0 PKI: 1st check succeeded
16:37:15 85A334E0 PKI: 2nd check succeeded
16:37:15 85A334E0 PKI: curMax 1239
16:37:15 85A334E0 PKI: 3rd check succeeded
16:37:15 85A334E0 PKI: curMax 1082
16:37:15 85A334E0 PKI: 4th check succeeded
16:37:15 85A334E0 PKI: Malloc succeeded
16:37:20 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:20 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:20 85A334E0 PKI: Entering PKI_ReadMachineUniqueCA()...
16:37:20 85A334E0 PKI: PKI_ReadMachineUniqueCA() returned 0
16:37:20 85A334E0 PKI: Entering x509Decode
16:37:20 85A334E0 PKI: certDataLen 1114
16:37:20 85A334E0 PKI: 1st check succeeded
16:37:20 85A334E0 PKI: 2nd check succeeded
16:37:20 85A334E0 PKI: curMax 1110
16:37:20 85A334E0 PKI: 3rd check succeeded
16:37:20 85A334E0 PKI: curMax 998
16:37:20 85A334E0 PKI: 4th check succeeded
16:37:20 85A334E0 PKI: Malloc succeeded
16:37:20 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:20 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:20 85A334E0 PKI: Entering x509Decode
16:37:20 85A334E0 PKI: certDataLen 1243
16:37:20 85A334E0 PKI: 1st check succeeded
16:37:20 85A334E0 PKI: 2nd check succeeded
16:37:20 85A334E0 PKI: curMax 1239
16:37:20 85A334E0 PKI: 3rd check succeeded
16:37:20 85A334E0 PKI: curMax 1082
16:37:20 85A334E0 PKI: 4th check succeeded
16:37:20 85A334E0 PKI: Malloc succeeded
16:37:20 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:20 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:20 85A334E0 PKI: Entering PKI_ReadMachineUniqueCA()...
16:37:20 85A334E0 PKI: PKI_ReadMachineUniqueCA() returned 0
16:37:20 85A334E0 PKI: Entering x509Decode
16:37:20 85A334E0 PKI: certDataLen 1114
16:37:20 85A334E0 PKI: 1st check succeeded
16:37:20 85A334E0 PKI: 2nd check succeeded
16:37:20 85A334E0 PKI: curMax 1110
16:37:20 85A334E0 PKI: 3rd check succeeded
16:37:20 85A334E0 PKI: curMax 998
16:37:20 85A334E0 PKI: 4th check succeeded
16:37:20 85A334E0 PKI: Malloc succeeded
16:37:20 85A334E0 PKI: Entering PKI_GetWorkingCAs
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: GetSecurityObjectName: Security Container type SAS:Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_GetWorkingCAs: This Server is the host server!
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
16:37:20 85A334E0 PKI: PKI_StoreCAInfo: Mission Accomplished
16:37:20 85A334E0 PKI: Exiting PKI_GetWorkingCAs ccode = 0
16:37:20 85A334E0 PKI: Entering x509Decode
16:37:20 85A334E0 PKI: certDataLen 1243
16:37:20 85A334E0 PKI: 1st check succeeded
16:37:20 85A334E0 PKI: 2nd check succeeded
16:37:20 85A334E0 PKI: curMax 1239
16:37:20 85A334E0 PKI: 3rd check succeeded
16:37:20 85A334E0 PKI: curMax 1082
16:37:20 85A334E0 PKI: 4th check succeeded
16:37:20 85A334E0 PKI: Malloc succeeded
17:12:10 85B13320 PKI: Entering PKIWireRequest
17:12:10 85B13320 PKI: Entering PKIVerbHandOff
17:12:10 85B13320 PKI: PKIVerbHandOff calling verb 5
17:12:10 85B13320 PKI: Entering _PKIGetCertficates taskID: 0
17:12:10 85B13320 PKI: _PKIGetCertificates : ODNLen = 39
17:12:10 85B13320 PKI: GC: v-0
17:12:10 85B13320 PKI: rf-x1
17:12:10 85B13320 PKI: ODNlen-39
17:12:10 85B13320 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security
17:12:10 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:10 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:10 85B13320 PKI: Entering PKI_GetKeyInfo()...
17:12:10 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:10 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:10 85B13320 PKI: Leaving PKI_GetKeyInfo..... (0)
17:12:10 85B13320 PKI: PKI_GetCertificates: Success!
17:12:10 85B13320 PKI: PKIVerbHandOff returned 0
17:12:10 85B13320 PKI: Exiting PKIVerbHandOff rc = 0
17:12:10 85B13320 PKI: Exiting PKIWireRequest err = 0
17:12:11 85B13320 PKI: Entering PKIWireRequest
17:12:11 85B13320 PKI: Entering PKIVerbHandOff
17:12:11 85B13320 PKI: PKIVerbHandOff calling verb 5
17:12:11 85B13320 PKI: Entering _PKIGetCertficates taskID: 0
17:12:11 85B13320 PKI: _PKIGetCertificates : ODNLen = 47
17:12:11 85B13320 PKI: GC: v-0
17:12:11 85B13320 PKI: rf-x5
17:12:11 85B13320 PKI: ODNlen-47
17:12:11 85B13320 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security.NE_IDN.
17:12:11 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:11 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:11 85B13320 PKI: Entering PKI_GetKeyInfo()...
17:12:11 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:11 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:11 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:12:11 85B13320 PKI: PKI_GetKeyInfo index -- 1
17:12:11 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:12:11 85B13320 PKI: PKI_GetKeyInfo index -- 2
17:12:11 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:12:11 85B13320 PKI: PKI_GetKeyInfo index -- 3
17:12:11 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:12:11 85B13320 PKI: PKI_GetKeyInfo index -- 4
17:12:11 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 1
17:12:11 85B13320 PKI: PKI_GetKeyInfo index -- 5
17:12:11 85B13320 PKI: Leaving PKI_GetKeyInfo..... (0)
17:12:11 85B13320 PKI: PKI_GetCertificates: Success!
17:12:11 85B13320 PKI: PKIVerbHandOff returned 0
17:12:11 85B13320 PKI: Exiting PKIVerbHandOff rc = 0
17:12:11 85B13320 PKI: Exiting PKIWireRequest err = 0
17:12:16 85B13320 PKI: Entering PKIWireRequest
17:12:16 85B13320 PKI: Entering PKIVerbHandOff
17:12:16 85B13320 PKI: PKIVerbHandOff calling verb 5
17:12:16 85B13320 PKI: Entering _PKIGetCertficates taskID: 0
17:12:16 85B13320 PKI: _PKIGetCertificates : ODNLen = 39
17:12:16 85B13320 PKI: GC: v-0
17:12:16 85B13320 PKI: rf-x10
17:12:16 85B13320 PKI: ODNlen-39
17:12:16 85B13320 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security
17:12:16 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:16 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:16 85B13320 PKI: Entering PKI_GetKeyInfo()...
17:12:16 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:12:16 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:12:16 85B13320 PKI: Leaving PKI_GetKeyInfo..... (0)
17:12:16 85B13320 PKI: PKI_GetCertificates: Success!
17:12:16 85B13320 PKI: PKIVerbHandOff returned 0
17:12:16 85B13320 PKI: Exiting PKIVerbHandOff rc = 0
17:12:16 85B13320 PKI: Exiting PKIWireRequest err = 0
17:12:36 85B13320 PKI: Entering PKI_GetWorkingCAs
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:12:36 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:12:36 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:12:36 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:12:36 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:12:36 85B13320 PKI: Entering PKI_ReadMachineUniqueCA()...
17:12:36 85B13320 PKI: PKI_ReadMachineUniqueCA() returned 0
17:12:36 85B13320 PKI: Entering x509Decode
17:12:36 85B13320 PKI: certDataLen 1114
17:12:36 85B13320 PKI: 1st check succeeded
17:12:36 85B13320 PKI: 2nd check succeeded
17:12:36 85B13320 PKI: curMax 1110
17:12:36 85B13320 PKI: 3rd check succeeded
17:12:36 85B13320 PKI: curMax 998
17:12:36 85B13320 PKI: 4th check succeeded
17:12:36 85B13320 PKI: Malloc succeeded
17:12:36 85B13320 PKI: Entering PKI_GetWorkingCAs
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:12:36 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:12:36 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:12:36 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:12:36 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:12:36 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:12:36 85B13320 PKI: Entering x509Decode
17:12:36 85B13320 PKI: certDataLen 1243
17:12:36 85B13320 PKI: 1st check succeeded
17:12:36 85B13320 PKI: 2nd check succeeded
17:12:36 85B13320 PKI: curMax 1239
17:12:36 85B13320 PKI: 3rd check succeeded
17:12:36 85B13320 PKI: curMax 1082
17:12:36 85B13320 PKI: 4th check succeeded
17:12:36 85B13320 PKI: Malloc succeeded
17:13:05 85B13320 PKI: Entering PKI_GetWorkingCAs
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:13:05 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:13:05 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:13:05 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:13:05 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:13:05 85B13320 PKI: Entering PKI_ReadMachineUniqueCA()...
17:13:05 85B13320 PKI: PKI_ReadMachineUniqueCA() returned 0
17:13:05 85B13320 PKI: Entering x509Decode
17:13:05 85B13320 PKI: certDataLen 1114
17:13:05 85B13320 PKI: 1st check succeeded
17:13:05 85B13320 PKI: 2nd check succeeded
17:13:05 85B13320 PKI: curMax 1110
17:13:05 85B13320 PKI: 3rd check succeeded
17:13:05 85B13320 PKI: curMax 998
17:13:05 85B13320 PKI: 4th check succeeded
17:13:05 85B13320 PKI: Malloc succeeded
517:13:05 85B13320 PKI: Entering PKI_GetWorkingCAs
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:13:05 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:13:05 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:13:05 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:13:05 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:13:05 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:13:05 85B13320 PKI: Entering x509Decode
17:13:05 85B13320 PKI: certDataLen 1243
17:13:05 85B13320 PKI: 1st check succeeded
17:13:05 85B13320 PKI: 2nd check succeeded
17:13:05 85B13320 PKI: curMax 1239
17:13:05 85B13320 PKI: 3rd check succeeded
17:13:05 85B13320 PKI: curMax 1082
17:13:05 85B13320 PKI: 4th check succeeded
17:13:05 85B13320 PKI: Malloc succeeded
17:14:07 85B13320 PKI: Entering PKIWireRequest
17:14:07 85B13320 PKI: Entering PKIVerbHandOff
17:14:07 85B13320 PKI: PKIVerbHandOff calling verb 5
17:14:07 85B13320 PKI: Entering _PKIGetCertficates taskID: 0
17:14:07 85B13320 PKI: _PKIGetCertificates : ODNLen = 39
17:14:07 85B13320 PKI: GC: v-0
17:14:07 85B13320 PKI: rf-x5
17:14:07 85B13320 PKI: ODNlen-39
17:14:07 85B13320 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security
17:14:07 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:14:07 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:14:07 85B13320 PKI: Entering PKI_GetKeyInfo()...
17:14:07 85B13320 PKI: Entering PKI_ReturnObjectType()...
17:14:07 85B13320 PKI: Exiting PKI_ReturnObjectType with 2
17:14:07 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:14:07 85B13320 PKI: PKI_GetKeyInfo index -- 1
17:14:07 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:14:07 85B13320 PKI: PKI_GetKeyInfo index -- 2
17:14:07 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:14:07 85B13320 PKI: PKI_GetKeyInfo index -- 3
Monday, Mar 2, 2009
17:14:07 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 0
17:14:07 85B13320 PKI: PKI_GetKeyInfo index -- 4
17:14:07 85B13320 PKI: PKI_GetKeyInfo rootMarker -- 1
17:14:07 85B13320 PKI: PKI_GetKeyInfo index -- 5
17:14:07 85B13320 PKI: Leaving PKI_GetKeyInfo..... (0)
17:14:07 85B13320 PKI: PKI_GetCertificates: Success!
17:14:07 85B13320 PKI: PKIVerbHandOff returned 0
17:14:07 85B13320 PKI: Exiting PKIVerbHandOff rc = 0
17:14:07 85B13320 PKI: Exiting PKIWireRequest err = 0
17:14:24 85B13320 PKI: Entering PKI_GetWorkingCAs
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:14:24 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:14:24 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:14:24 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:14:24 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:14:24 85B13320 PKI: Entering PKI_ReadMachineUniqueCA()...
17:14:24 85B13320 PKI: PKI_ReadMachineUniqueCA() returned 0
17:14:24 85B13320 PKI: Entering x509Decode
17:14:24 85B13320 PKI: certDataLen 1114
17:14:24 85B13320 PKI: 1st check succeeded
17:14:24 85B13320 PKI: 2nd check succeeded
17:14:24 85B13320 PKI: curMax 1110
17:14:24 85B13320 PKI: 3rd check succeeded
17:14:24 85B13320 PKI: curMax 998
17:14:24 85B13320 PKI: 4th check succeeded
17:14:24 85B13320 PKI: Malloc succeeded
17:14:24 85B13320 PKI: Entering PKI_GetWorkingCAs
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:14:24 85B13320 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:14:24 85B13320 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:14:24 85B13320 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:14:24 85B13320 PKI: PKI_StoreCAInfo: Mission Accomplished
17:14:24 85B13320 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:14:24 85B13320 PKI: Entering x509Decode
17:14:24 85B13320 PKI: certDataLen 1243
17:14:24 85B13320 PKI: 1st check succeeded
17:14:24 85B13320 PKI: 2nd check succeeded
17:14:24 85B13320 PKI: curMax 1239
17:14:24 85B13320 PKI: 3rd check succeeded
17:14:24 85B13320 PKI: curMax 1082
17:14:24 85B13320 PKI: 4th check succeeded
17:14:24 85B13320 PKI: Malloc succeeded
17:17:18 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:17:18 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:17:18 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:17:18 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:17:18 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:17:18 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:17:18 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:17:18 85BD6040 PKI: Entering x509Decode
17:17:18 85BD6040 PKI: certDataLen 1114
17:17:18 85BD6040 PKI: 1st check succeeded
17:17:18 85BD6040 PKI: 2nd check succeeded
17:17:18 85BD6040 PKI: curMax 1110
17:17:18 85BD6040 PKI: 3rd check succeeded
17:17:18 85BD6040 PKI: curMax 998
17:17:18 85BD6040 PKI: 4th check succeeded
17:17:18 85BD6040 PKI: Malloc succeeded
17:17:18 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:17:18 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:17:18 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:17:18 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:17:18 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:17:18 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:17:18 85BD6040 PKI: Entering x509Decode
17:17:18 85BD6040 PKI: certDataLen 1243
17:17:18 85BD6040 PKI: 1st check succeeded
17:17:18 85BD6040 PKI: 2nd check succeeded
17:17:18 85BD6040 PKI: curMax 1239
17:17:18 85BD6040 PKI: 3rd check succeeded
17:17:18 85BD6040 PKI: curMax 1082
17:17:18 85BD6040 PKI: 4th check succeeded
17:17:18 85BD6040 PKI: Malloc succeeded
17:19:46 85BD6040 PKI: Entering PKIWireRequest
17:19:46 85BD6040 PKI: Entering PKIVerbHandOff
17:19:46 85BD6040 PKI: PKIVerbHandOff calling verb 5
17:19:46 85BD6040 PKI: Entering _PKIGetCertficates taskID: 0
17:19:46 85BD6040 PKI: _PKIGetCertificates : ODNLen = 39
17:19:46 85BD6040 PKI: GC: v-0
17:19:46 85BD6040 PKI: rf-x10
17:19:46 85BD6040 PKI: ODNlen-39
17:19:46 85BD6040 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security
17:19:46 85BD6040 PKI: Entering PKI_ReturnObjectType()...
17:19:46 85BD6040 PKI: Exiting PKI_ReturnObjectType with 2
17:19:46 85BD6040 PKI: Entering PKI_GetKeyInfo()...
17:19:46 85BD6040 PKI: Entering PKI_ReturnObjectType()...
17:19:46 85BD6040 PKI: Exiting PKI_ReturnObjectType with 2
17:19:46 85BD6040 PKI: Leaving PKI_GetKeyInfo..... (0)
17:19:46 85BD6040 PKI: PKI_GetCertificates: Success!
17:19:46 85BD6040 PKI: PKIVerbHandOff returned 0
17:19:46 85BD6040 PKI: Exiting PKIVerbHandOff rc = 0
17:19:46 85BD6040 PKI: Exiting PKIWireRequest err = 0
17:19:46 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:46 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:46 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:46 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:46 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:46 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:19:46 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:19:46 85BD6040 PKI: Entering x509Decode
17:19:46 85BD6040 PKI: certDataLen 1114
17:19:46 85BD6040 PKI: 1st check succeeded
17:19:46 85BD6040 PKI: 2nd check succeeded
17:19:46 85BD6040 PKI: curMax 1110
17:19:46 85BD6040 PKI: 3rd check succeeded
17:19:46 85BD6040 PKI: curMax 998
17:19:46 85BD6040 PKI: 4th check succeeded
17:19:46 85BD6040 PKI: Malloc succeeded
17:19:46 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:46 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:46 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:46 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:46 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:46 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:46 85BD6040 PKI: Entering x509Decode
17:19:46 85BD6040 PKI: certDataLen 1243
17:19:46 85BD6040 PKI: 1st check succeeded
17:19:46 85BD6040 PKI: 2nd check succeeded
17:19:46 85BD6040 PKI: curMax 1239
17:19:46 85BD6040 PKI: 3rd check succeeded
17:19:46 85BD6040 PKI: curMax 1082
17:19:46 85BD6040 PKI: 4th check succeeded
17:19:46 85BD6040 PKI: Malloc succeeded
17:19:56 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:56 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:56 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:56 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:56 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:56 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:19:56 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:19:56 85BD6040 PKI: Entering x509Decode
17:19:56 85BD6040 PKI: certDataLen 1114
17:19:56 85BD6040 PKI: 1st check succeeded
17:19:56 85BD6040 PKI: 2nd check succeeded
17:19:56 85BD6040 PKI: curMax 1110
17:19:56 85BD6040 PKI: 3rd check succeeded
17:19:56 85BD6040 PKI: curMax 998
17:19:56 85BD6040 PKI: 4th check succeeded
17:19:56 85BD6040 PKI: Malloc succeeded
17:19:56 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:56 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:56 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:56 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:56 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:56 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:56 85BD6040 PKI: Entering x509Decode
17:19:56 85BD6040 PKI: certDataLen 1243
17:19:56 85BD6040 PKI: 1st check succeeded
17:19:56 85BD6040 PKI: 2nd check succeeded
17:19:56 85BD6040 PKI: curMax 1239
17:19:56 85BD6040 PKI: 3rd check succeeded
17:19:56 85BD6040 PKI: curMax 1082
17:19:56 85BD6040 PKI: 4th check succeeded
17:19:56 85BD6040 PKI: Malloc succeeded
17:19:58 85BD6040 PKI: Entering PKIWireRequest
17:19:58 85BD6040 PKI: Entering PKIVerbHandOff
17:19:58 85BD6040 PKI: PKIVerbHandOff calling verb 4
17:19:58 85BD6040 PKI: SC: v-3
17:19:58 85BD6040 PKI: cl-945 data-
17:19:58 85BD6040 PKI: SC: hashLen-128
17:19:58 85BD6040 PKI: numInChain-3
17:19:58 85BD6040 PKI: chainLen-3598
17:19:58 85BD6040 PKI: sa-4
17:19:58 85BD6040 PKI: dF-x0
17:19:58 85BD6040 PKI: vf-x49AC409E
17:19:58 85BD6040 PKI: vt-x4D6EA79E
17:19:58 85BD6040 PKI: SC: subjLen-26
17:19:58 85BD6040 PKI: subjDN-.O=NE_IDN.CN=192.168.1.201
17:19:58 85BD6040 PKI: SC: serverLen-14
17:19:58 85BD6040 PKI: serverDN-CN=ACME01.O=ACME
17:19:58 85BD6040 PKI: Entering PKI_GenerateCertificateFromCSR....
17:19:58 85BD6040 PKI: CSR is internal.
17:19:58 85BD6040 PKI: Validity Check Passes...
17:19:58 85BD6040 PKI: PKI_GenerateCertificateFromCSR: Setting subject name to .O=NE_IDN.CN=192.168.1.201
17:19:58 85BD6040 PKI: Entering getNextNameComponent...
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .O=NE_IDN.CN=192.168.1.201
17:19:58 85BD6040 PKI: getNameOID: incoming token is O=
17:19:58 85BD6040 PKI: getNextNameComponent: name=
17:19:58 85BD6040 PKI: N
17:19:58 85BD6040 PKI: E
17:19:58 85BD6040 PKI: _
17:19:58 85BD6040 PKI: I
17:19:58 85BD6040 PKI: D
17:19:58 85BD6040 PKI: N
17:19:58 85BD6040 PKI: -- found '.' checking for new token.
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=192.168.1.201
17:19:58 85BD6040 PKI: getNameOID: incoming token is CN=
17:19:58 85BD6040 PKI:
17:19:58 85BD6040 PKI: getNextNameComponent: 9 parsed
17:19:58 85BD6040 PKI: getNextNameComponent: rc = 0
17:19:58 85BD6040 PKI: Entering getNextNameComponent...
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=192.168.1.201
17:19:58 85BD6040 PKI: getNameOID: incoming token is CN=
17:19:58 85BD6040 PKI: getNextNameComponent: name=
17:19:58 85BD6040 PKI: 1
17:19:58 85BD6040 PKI: 9
17:19:58 85BD6040 PKI: 2
17:19:58 85BD6040 PKI: -- found '.' checking for new token.
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .168.1.201
17:19:58 85BD6040 PKI: getNameOID: incoming name did end with an =
17:19:58 85BD6040 PKI: .
17:19:58 85BD6040 PKI: 1
17:19:58 85BD6040 PKI: 6
17:19:58 85BD6040 PKI: 8
17:19:58 85BD6040 PKI: -- found '.' checking for new token.
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .1.201
17:19:58 85BD6040 PKI: getNameOID: incoming name did end with an =
17:19:58 85BD6040 PKI: .
17:19:58 85BD6040 PKI: 1
17:19:58 85BD6040 PKI: -- found '.' checking for new token.
17:19:58 85BD6040 PKI: Entering getNameOID - name to be parsed: .201
17:19:58 85BD6040 PKI: getNameOID: incoming name did end with an =
17:19:58 85BD6040 PKI: .
17:19:58 85BD6040 PKI: 2
17:19:58 85BD6040 PKI: 0
17:19:58 85BD6040 PKI: 1
17:19:58 85BD6040 PKI:
17:19:58 85BD6040 PKI: getNextNameComponent: 17 parsed
17:19:58 85BD6040 PKI: getNextNameComponent: rc = 0
17:19:58 85BD6040 PKI: Key Usage completed.
17:19:58 85BD6040 PKI: Basic Constaints completed.
17:19:58 85BD6040 PKI: Subject Alt Names completed.
17:19:58 85BD6040 PKI: Novell Security Attribute completed.
17:19:58 85BD6040 PKI: Entering PKI_GetWorkingCAs
Monday, Mar 2, 2009
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:58 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:58 85BD6040 PKI: PKI_ReadCAPrivateKey: Unable to load CA private key (-1418)
17:19:58 85BD6040 PKI: SC: err from PKI_GenerateCertificateFromCSR = -1418
17:19:58 85BD6040 PKI: PKIVerbHandOff returned -1418
17:19:58 85BD6040 PKI: Exiting PKIVerbHandOff rc = -1418
17:19:58 85BD6040 PKI: Exiting PKIWireRequest err = -1418
17:19:58 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:58 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:58 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:19:58 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:19:58 85BD6040 PKI: Entering x509Decode
17:19:58 85BD6040 PKI: certDataLen 1114
17:19:58 85BD6040 PKI: 1st check succeeded
17:19:58 85BD6040 PKI: 2nd check succeeded
17:19:58 85BD6040 PKI: curMax 1110
17:19:58 85BD6040 PKI: 3rd check succeeded
17:19:58 85BD6040 PKI: curMax 998
17:19:58 85BD6040 PKI: 4th check succeeded
17:19:58 85BD6040 PKI: Malloc succeeded
17:19:58 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:19:58 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:19:58 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:19:58 85BD6040 PKI: Entering x509Decode
17:19:58 85BD6040 PKI: certDataLen 1243
17:19:58 85BD6040 PKI: 1st check succeeded
17:19:58 85BD6040 PKI: 2nd check succeeded
17:19:58 85BD6040 PKI: curMax 1239
17:19:58 85BD6040 PKI: 3rd check succeeded
17:19:58 85BD6040 PKI: curMax 1082
17:19:58 85BD6040 PKI: 4th check succeeded
17:19:58 85BD6040 PKI: Malloc succeeded
17:20:01 85BD6040 PKI: Entering PKIWireRequest
17:20:01 85BD6040 PKI: Entering PKIVerbHandOff
17:20:01 85BD6040 PKI: PKIVerbHandOff calling verb 4
17:20:01 85BD6040 PKI: SC: v-3
17:20:01 85BD6040 PKI: cl-945 data-
17:20:01 85BD6040 PKI: SC: hashLen-128
17:20:01 85BD6040 PKI: numInChain-3
17:20:01 85BD6040 PKI: chainLen-3598
17:20:01 85BD6040 PKI: sa-4
17:20:01 85BD6040 PKI: dF-x0
17:20:01 85BD6040 PKI: vf-x49AC409E
17:20:01 85BD6040 PKI: vt-x4D6EA79E
17:20:01 85BD6040 PKI: SC: subjLen-26
17:20:01 85BD6040 PKI: subjDN-.O=NE_IDN.CN=192.168.1.201
17:20:01 85BD6040 PKI: SC: serverLen-14
17:20:01 85BD6040 PKI: serverDN-CN=ACME01.O=ACME
17:20:01 85BD6040 PKI: Entering PKI_GenerateCertificateFromCSR....
17:20:01 85BD6040 PKI: CSR is internal.
17:20:01 85BD6040 PKI: Validity Check Passes...
17:20:01 85BD6040 PKI: PKI_GenerateCertificateFromCSR: Setting subject name to .O=NE_IDN.CN=192.168.1.201
17:20:01 85BD6040 PKI: Entering getNextNameComponent...
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .O=NE_IDN.CN=192.168.1.201
17:20:01 85BD6040 PKI: getNameOID: incoming token is O=
17:20:01 85BD6040 PKI: getNextNameComponent: name=
17:20:01 85BD6040 PKI: N
17:20:01 85BD6040 PKI: E
17:20:01 85BD6040 PKI: _
17:20:01 85BD6040 PKI: I
17:20:01 85BD6040 PKI: D
17:20:01 85BD6040 PKI: N
17:20:01 85BD6040 PKI: -- found '.' checking for new token.
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=192.168.1.201
17:20:01 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:01 85BD6040 PKI:
17:20:01 85BD6040 PKI: getNextNameComponent: 9 parsed
17:20:01 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:01 85BD6040 PKI: Entering getNextNameComponent...
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=192.168.1.201
17:20:01 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:01 85BD6040 PKI: getNextNameComponent: name=
17:20:01 85BD6040 PKI: 1
17:20:01 85BD6040 PKI: 9
17:20:01 85BD6040 PKI: 2
17:20:01 85BD6040 PKI: -- found '.' checking for new token.
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .168.1.201
17:20:01 85BD6040 PKI: getNameOID: incoming name did end with an =
17:20:01 85BD6040 PKI: .
17:20:01 85BD6040 PKI: 1
17:20:01 85BD6040 PKI: 6
17:20:01 85BD6040 PKI: 8
17:20:01 85BD6040 PKI: -- found '.' checking for new token.
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .1.201
17:20:01 85BD6040 PKI: getNameOID: incoming name did end with an =
17:20:01 85BD6040 PKI: .
17:20:01 85BD6040 PKI: 1
17:20:01 85BD6040 PKI: -- found '.' checking for new token.
17:20:01 85BD6040 PKI: Entering getNameOID - name to be parsed: .201
17:20:01 85BD6040 PKI: getNameOID: incoming name did end with an =
17:20:01 85BD6040 PKI: .
17:20:01 85BD6040 PKI: 2
17:20:01 85BD6040 PKI: 0
17:20:01 85BD6040 PKI: 1
17:20:01 85BD6040 PKI:
17:20:01 85BD6040 PKI: getNextNameComponent: 17 parsed
17:20:01 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:01 85BD6040 PKI: Key Usage completed.
17:20:01 85BD6040 PKI: Basic Constaints completed.
17:20:01 85BD6040 PKI: Subject Alt Names completed.
17:20:01 85BD6040 PKI: Novell Security Attribute completed.
17:20:01 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:01 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:01 85BD6040 PKI: PKI_ReadCAPrivateKey: Unable to load CA private key (-1418)
17:20:01 85BD6040 PKI: SC: err from PKI_GenerateCertificateFromCSR = -1418
17:20:01 85BD6040 PKI: PKIVerbHandOff returned -1418
17:20:01 85BD6040 PKI: Exiting PKIVerbHandOff rc = -1418
17:20:01 85BD6040 PKI: Exiting PKIWireRequest err = -1418
17:20:01 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:01 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:01 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:20:01 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:20:01 85BD6040 PKI: Entering x509Decode
17:20:01 85BD6040 PKI: certDataLen 1114
17:20:01 85BD6040 PKI: 1st check succeeded
17:20:01 85BD6040 PKI: 2nd check succeeded
17:20:01 85BD6040 PKI: curMax 1110
17:20:01 85BD6040 PKI: 3rd check succeeded
17:20:01 85BD6040 PKI: curMax 998
17:20:01 85BD6040 PKI: 4th check succeeded
17:20:01 85BD6040 PKI: Malloc succeeded
17:20:01 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:01 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:01 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:01 85BD6040 PKI: Entering x509Decode
17:20:01 85BD6040 PKI: certDataLen 1243
17:20:01 85BD6040 PKI: 1st check succeeded
17:20:01 85BD6040 PKI: 2nd check succeeded
17:20:01 85BD6040 PKI: curMax 1239
17:20:01 85BD6040 PKI: 3rd check succeeded
17:20:01 85BD6040 PKI: curMax 1082
17:20:01 85BD6040 PKI: 4th check succeeded
17:20:01 85BD6040 PKI: Malloc succeeded
17:20:03 85BD6040 PKI: Entering PKIWireRequest
17:20:03 85BD6040 PKI: Entering PKIVerbHandOff
17:20:03 85BD6040 PKI: PKIVerbHandOff calling verb 4
17:20:03 85BD6040 PKI: SC: v-3
17:20:03 85BD6040 PKI: cl-931 data-
17:20:03 85BD6040 PKI: SC: hashLen-128
17:20:03 85BD6040 PKI: numInChain-3
17:20:03 85BD6040 PKI: chainLen-3598
17:20:03 85BD6040 PKI: sa-4
17:20:03 85BD6040 PKI: dF-x0
17:20:03 85BD6040 PKI: vf-x49AC409E
17:20:03 85BD6040 PKI: vt-x4D6EA79E
17:20:03 85BD6040 PKI: SC: subjLen-18
17:20:03 85BD6040 PKI: subjDN-.O=NE_IDN.CN=ACME01
17:20:03 85BD6040 PKI: SC: serverLen-14
17:20:03 85BD6040 PKI: serverDN-CN=ACME01.O=ACME
17:20:03 85BD6040 PKI: Entering PKI_GenerateCertificateFromCSR....
17:20:03 85BD6040 PKI: CSR is internal.
17:20:03 85BD6040 PKI: Validity Check Passes...
17:20:03 85BD6040 PKI: PKI_GenerateCertificateFromCSR: Setting subject name to .O=NE_IDN.CN=ACME01
17:20:03 85BD6040 PKI: Entering getNextNameComponent...
17:20:03 85BD6040 PKI: Entering getNameOID - name to be parsed: .O=NE_IDN.CN=ACME01
17:20:03 85BD6040 PKI: getNameOID: incoming token is O=
17:20:03 85BD6040 PKI: getNextNameComponent: name=
17:20:03 85BD6040 PKI: N
17:20:03 85BD6040 PKI: E
17:20:03 85BD6040 PKI: _
17:20:03 85BD6040 PKI: I
17:20:03 85BD6040 PKI: D
17:20:03 85BD6040 PKI: N
17:20:03 85BD6040 PKI: -- found '.' checking for new token.
17:20:03 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=ACME01
17:20:03 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:03 85BD6040 PKI:
17:20:03 85BD6040 PKI: getNextNameComponent: 9 parsed
17:20:03 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:03 85BD6040 PKI: Entering getNextNameComponent...
17:20:03 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=ACME01
17:20:03 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:03 85BD6040 PKI: getNextNameComponent: name=
17:20:03 85BD6040 PKI: A
17:20:03 85BD6040 PKI: C
17:20:03 85BD6040 PKI: M
17:20:03 85BD6040 PKI: E
17:20:03 85BD6040 PKI: 1
17:20:03 85BD6040 PKI:
17:20:03 85BD6040 PKI: getNextNameComponent: 9 parsed
17:20:03 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:03 85BD6040 PKI: Key Usage completed.
17:20:03 85BD6040 PKI: Basic Constaints completed.
17:20:03 85BD6040 PKI: Subject Alt Names completed.
17:20:03 85BD6040 PKI: Novell Security Attribute completed.
17:20:03 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:03 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:03 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:03 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:03 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:03 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:03 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:03 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:03 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:03 85BD6040 PKI: PKI_ReadCAPrivateKey: Unable to load CA private key (-1418)
17:20:03 85BD6040 PKI: SC: err from PKI_GenerateCertificateFromCSR = -1418
17:20:03 85BD6040 PKI: PKIVerbHandOff returned -1418
17:20:03 85BD6040 PKI: Exiting PKIVerbHandOff rc = -1418
17:20:03 85BD6040 PKI: Exiting PKIWireRequest err = -1418
17:20:04 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:04 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:04 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:04 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:04 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:04 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:20:04 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:20:04 85BD6040 PKI: Entering x509Decode
Monday, Mar 2, 2009
17:20:04 85BD6040 PKI: certDataLen 1114
17:20:04 85BD6040 PKI: 1st check succeeded
17:20:04 85BD6040 PKI: 2nd check succeeded
17:20:04 85BD6040 PKI: curMax 1110
17:20:04 85BD6040 PKI: 3rd check succeeded
17:20:04 85BD6040 PKI: curMax 998
17:20:04 85BD6040 PKI: 4th check succeeded
17:20:04 85BD6040 PKI: Malloc succeeded
17:20:04 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:04 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:04 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:04 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:04 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:04 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:04 85BD6040 PKI: Entering x509Decode
17:20:04 85BD6040 PKI: certDataLen 1243
17:20:04 85BD6040 PKI: 1st check succeeded
17:20:04 85BD6040 PKI: 2nd check succeeded
17:20:04 85BD6040 PKI: curMax 1239
17:20:04 85BD6040 PKI: 3rd check succeeded
17:20:04 85BD6040 PKI: curMax 1082
17:20:04 85BD6040 PKI: 4th check succeeded
17:20:04 85BD6040 PKI: Malloc succeeded
17:20:06 85BD6040 PKI: Entering PKIWireRequest
17:20:06 85BD6040 PKI: Entering PKIVerbHandOff
17:20:06 85BD6040 PKI: PKIVerbHandOff calling verb 4
17:20:06 85BD6040 PKI: SC: v-3
17:20:06 85BD6040 PKI: cl-931 data-
17:20:06 85BD6040 PKI: SC: hashLen-128
17:20:06 85BD6040 PKI: numInChain-3
17:20:06 85BD6040 PKI: chainLen-3598
17:20:06 85BD6040 PKI: sa-4
17:20:06 85BD6040 PKI: dF-x0
17:20:06 85BD6040 PKI: vf-x49AC409E
17:20:06 85BD6040 PKI: vt-x4D6EA79E
17:20:06 85BD6040 PKI: SC: subjLen-18
17:20:06 85BD6040 PKI: subjDN-.O=NE_IDN.CN=ACME01
17:20:06 85BD6040 PKI: SC: serverLen-14
17:20:06 85BD6040 PKI: serverDN-CN=ACME01.O=ACME
17:20:06 85BD6040 PKI: Entering PKI_GenerateCertificateFromCSR....
17:20:06 85BD6040 PKI: CSR is internal.
17:20:06 85BD6040 PKI: Validity Check Passes...
17:20:06 85BD6040 PKI: PKI_GenerateCertificateFromCSR: Setting subject name to .O=NE_IDN.CN=ACME01
17:20:06 85BD6040 PKI: Entering getNextNameComponent...
17:20:06 85BD6040 PKI: Entering getNameOID - name to be parsed: .O=NE_IDN.CN=ACME01
17:20:06 85BD6040 PKI: getNameOID: incoming token is O=
17:20:06 85BD6040 PKI: getNextNameComponent: name=
17:20:06 85BD6040 PKI: N
17:20:06 85BD6040 PKI: E
17:20:06 85BD6040 PKI: _
17:20:06 85BD6040 PKI: I
17:20:06 85BD6040 PKI: D
17:20:06 85BD6040 PKI: N
17:20:06 85BD6040 PKI: -- found '.' checking for new token.
17:20:06 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=ACME01
17:20:06 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:06 85BD6040 PKI:
17:20:06 85BD6040 PKI: getNextNameComponent: 9 parsed
17:20:06 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:06 85BD6040 PKI: Entering getNextNameComponent...
17:20:06 85BD6040 PKI: Entering getNameOID - name to be parsed: .CN=ACME01
17:20:06 85BD6040 PKI: getNameOID: incoming token is CN=
17:20:06 85BD6040 PKI: getNextNameComponent: name=
17:20:06 85BD6040 PKI: A
17:20:06 85BD6040 PKI: C
17:20:06 85BD6040 PKI: M
17:20:06 85BD6040 PKI: E
17:20:06 85BD6040 PKI: 1
17:20:06 85BD6040 PKI:
17:20:06 85BD6040 PKI: getNextNameComponent: 9 parsed
17:20:06 85BD6040 PKI: getNextNameComponent: rc = 0
17:20:06 85BD6040 PKI: Key Usage completed.
17:20:06 85BD6040 PKI: Basic Constaints completed.
17:20:06 85BD6040 PKI: Subject Alt Names completed.
17:20:06 85BD6040 PKI: Novell Security Attribute completed.
17:20:06 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:06 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:06 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:06 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:06 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:06 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:06 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:06 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:06 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:06 85BD6040 PKI: PKI_ReadCAPrivateKey: Unable to load CA private key (-1418)
17:20:06 85BD6040 PKI: SC: err from PKI_GenerateCertificateFromCSR = -1418
17:20:06 85BD6040 PKI: PKIVerbHandOff returned -1418
17:20:06 85BD6040 PKI: Exiting PKIVerbHandOff rc = -1418
17:20:06 85BD6040 PKI: Exiting PKIWireRequest err = -1418
17:20:07 85BD6040 PKI: Entering PKIWireRequest
17:20:07 85BD6040 PKI: Entering PKIVerbHandOff
17:20:07 85BD6040 PKI: PKIVerbHandOff calling verb 5
17:20:07 85BD6040 PKI: Entering _PKIGetCertficates taskID: 0
17:20:07 85BD6040 PKI: _PKIGetCertificates : ODNLen = 39
17:20:07 85BD6040 PKI: GC: v-0
17:20:07 85BD6040 PKI: rf-x10
17:20:07 85BD6040 PKI: ODNlen-39
17:20:07 85BD6040 PKI: PKI_GetCertificates: Reading certs from object CN=ACME Corp CA.CN=Security
17:20:07 85BD6040 PKI: Entering PKI_ReturnObjectType()...
17:20:07 85BD6040 PKI: Exiting PKI_ReturnObjectType with 2
17:20:07 85BD6040 PKI: Entering PKI_GetKeyInfo()...
17:20:07 85BD6040 PKI: Entering PKI_ReturnObjectType()...
17:20:07 85BD6040 PKI: Exiting PKI_ReturnObjectType with 2
17:20:07 85BD6040 PKI: Leaving PKI_GetKeyInfo..... (0)
17:20:07 85BD6040 PKI: PKI_GetCertificates: Success!
17:20:07 85BD6040 PKI: PKIVerbHandOff returned 0
17:20:07 85BD6040 PKI: Exiting PKIVerbHandOff rc = 0
17:20:07 85BD6040 PKI: Exiting PKIWireRequest err = 0
17:20:07 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:07 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:07 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:20:07 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:20:07 85BD6040 PKI: Entering x509Decode
17:20:07 85BD6040 PKI: certDataLen 1114
17:20:07 85BD6040 PKI: 1st check succeeded
17:20:07 85BD6040 PKI: 2nd check succeeded
17:20:07 85BD6040 PKI: curMax 1110
17:20:07 85BD6040 PKI: 3rd check succeeded
17:20:07 85BD6040 PKI: curMax 998
17:20:07 85BD6040 PKI: 4th check succeeded
17:20:07 85BD6040 PKI: Malloc succeeded
17:20:07 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:07 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:07 85BD6040 PKI: Entering x509Decode
17:20:07 85BD6040 PKI: certDataLen 1243
17:20:07 85BD6040 PKI: 1st check succeeded
17:20:07 85BD6040 PKI: 2nd check succeeded
17:20:07 85BD6040 PKI: curMax 1239
17:20:07 85BD6040 PKI: 3rd check succeeded
17:20:07 85BD6040 PKI: curMax 1082
17:20:07 85BD6040 PKI: 4th check succeeded
17:20:07 85BD6040 PKI: Malloc succeeded
17:20:07 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:07 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:07 85BD6040 PKI: Entering PKI_ReadMachineUniqueCA()...
17:20:07 85BD6040 PKI: PKI_ReadMachineUniqueCA() returned 0
17:20:07 85BD6040 PKI: Entering x509Decode
17:20:07 85BD6040 PKI: certDataLen 1114
17:20:07 85BD6040 PKI: 1st check succeeded
17:20:07 85BD6040 PKI: 2nd check succeeded
17:20:07 85BD6040 PKI: curMax 1110
17:20:07 85BD6040 PKI: 3rd check succeeded
17:20:07 85BD6040 PKI: curMax 998
17:20:07 85BD6040 PKI: 4th check succeeded
17:20:07 85BD6040 PKI: Malloc succeeded
17:20:07 85BD6040 PKI: Entering PKI_GetWorkingCAs
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: Original ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: GetSecurityObjectName: Security Container type SAS:Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCADN = ACME Corp CA.Security
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: treeCA host Server = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_GetWorkingCAs: This Server is the host server!
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: ServerDN = ACME9.ACME
17:20:07 85BD6040 PKI: PKI_StoreCAInfo: Mission Accomplished
17:20:07 85BD6040 PKI: Exiting PKI_GetWorkingCAs ccode = 0
17:20:07 85BD6040 PKI: Entering x509Decode
17:20:07 85BD6040 PKI: certDataLen 1243
17:20:07 85BD6040 PKI: 1st check succeeded
17:20:07 85BD6040 PKI: 2nd check succeeded
17:20:07 85BD6040 PKI: curMax 1239
17:20:07 85BD6040 PKI: 3rd check succeeded
17:20:07 85BD6040 PKI: curMax 1082
17:20:07 85BD6040 PKI: 4th check succeeded
17:20:07 85BD6040 PKI: Malloc succeeded
17:20:07 85BD6040 PKI: Entering PKIWireRequest
17:20:07 85BD6040 PKI: Entering PKIVerbHandOff
17:20:07 85BD6040 PKI: PKIVerbHandOff calling verb 14
17:20:07 85BD6040 PKI: Entering _PKISGetIPAndDNSAddresses
17:20:07 85BD6040 PKI: Host name = ACME12
17:20:07 85BD6040 PKI: Reading IP Addresses ...
17:20:07 85BD6040 PKI: WSALookupServiceBegin successful
17:20:17 85BD6040 PKI: WSALookupServiceNext successful
17:20:17 85BD6040 PKI: HostAddress:
17:20:17 85BD6040 PKI: 192.
17:20:17 85BD6040 PKI: 168.
17:20:17 85BD6040 PKI: 1.
17:20:17 85BD6040 PKI: 200
17:20:17 85BD6040 PKI: -Ignoring duplicate IP address:
17:20:17 85BD6040 PKI: 192.
17:20:17 85BD6040 PKI: 168.
17:20:17 85BD6040 PKI: 1.
17:20:17 85BD6040 PKI: 200
17:20:17 85BD6040 PKI: WSALookupServiceNext successful
17:20:17 85BD6040 PKI: -Ignoring duplicate IP address:
17:20:17 85BD6040 PKI: 192.
17:20:17 85BD6040 PKI: 168.
17:20:17 85BD6040 PKI: 1.
17:20:17 85BD6040 PKI: 200
17:20:17 85BD6040 PKI: WSALookupServiceNext error -1
17:20:17 85BD6040 PKI: WSAGetLastError -- 10110 -- no more data (Normal Error)
17:20:17 85BD6040 PKI: WSALookupServiceEnd
17:20:17 85BD6040 PKI: Reading DNS Addresses ...
17:20:17 85BD6040 PKI: WSALookupServiceBegin successful
17:20:17 85BD6040 PKI: WSALookupServiceNext successful
17:20:17 85BD6040 PKI: DNS Name for IP Address 192.168.1.200 = ACME12
17:20:17 85BD6040 PKI: WSALookupServiceNext error -1
17:20:17 85BD6040 PKI: WSAGetLastError -- 10110 -- no more data (Normal Error)
17:20:17 85BD6040 PKI: WSALookupServiceEnd
17:20:17 85BD6040 PKI: GetIPAndDNSAddresses returning (0)
17:20:17 85BD6040 PKI: _PKISGetIPAndDNSAddresses returning (0)
17:20:17 85BD6040 PKI: PKIVerbHandOff returned 0
17:20:17 85BD6040 PKI: Exiting PKIVerbHandOff rc = 0
17:20:17 85BD6040 PKI: Exiting PKIWireRequest err = 0