08.09.2006 18:59:17ошибка "внутренняя ошибка в цепочке сертификатов" Ответов: 0
Шмыков Дима (Казань, компания Центр-Сервис, софт-отдел, lead developer)
GetLastError() возвращает "внутренняя ошибка в цепочке сертификатов"

Прошу прокомментировать ошибку. Вот Лог..

'CryptedDocs.exe': Loaded 'C:\WINDOWS\WinSxS\x86_CryptoPro.PKI.TSP_a6d31b994cfcddc4_1.0.25.0_x-ww_b0dba329\tsp.dll', Binary was not built with debug information.
18:36:46.790 ::*Session* :: WinHttpCrackUrl("http://tsp.vrca.ru/tsp/tsp.srf", 0x0, 0x0, 0x12d5c0)
18:36:46.790 ::*Session* :: WinHttpCrackUrlA("http://tsp.vrca.ru/tsp/tsp.srf", 0x1e, 0x0, 0x12d470)
18:36:46.790 ::*Session* :: WinHttpCrackUrlA() returning TRUE
18:36:46.790 ::*Session* :: WinHttpCrackUrl() returning TRUE
18:36:46.790 ::*Session* :: WinHttpOpen("Crypto-Pro tspcli.dll", (1), "", "", 0x0)
18:36:46.790 ::*Session* :: WinHttpOpen() returning handle 0xe27000
18:36:46.790 ::*Session* :: DoConnectoidsExist()
18:36:46.800 ::*Session* :: IsRasInstalled()
18:36:46.800 ::*Session* :: IsRasInstalled() returning TRUE
18:36:46.800 ::*Session* :: DoConnectoidsExist() returning TRUE
18:36:46.890 ::*Session* :: WinHttpSetOption(0xe27000, (38), 0x12d5a4 [0x3], 12)
18:36:46.890 ::*Session* :: WinHttpSetOption() returning TRUE
18:36:46.890 ::*Session* :: WinHttpConnect(0xe27000, "tsp.vrca.ru", 80, 0x0)
18:36:46.920 ::*Session* :: WinHttpConnect() returning handle 0xe27100
18:36:46.920 ::*Session* :: WinHttpOpenRequest(0xe27100, "POST", "tsp/tsp.srf", "", "", 0x0, 0x00000000)
18:36:46.920 ::*Session* :: WinHttpCreateUrlA(0x12d350, 0x0, 0x4a00000, 0x12d38c)
18:36:46.920 ::*Session* :: WinHttpCreateUrlA() returning TRUE
18:36:46.920 ::*0000001* :: WinHttpOpenRequest() returning handle 0x49b2000
18:36:46.920 ::*0000001* :: WinHttpSetOption(0x49b2000, (77), 0x12d578 [0x2], 4)
18:36:46.920 ::*0000001* :: WinHttpSetOption() returning TRUE
18:36:46.920 ::*0000001* :: WinHttpSendRequest(0x49b2000, "Content-type: application/timestamp-query", -1, 0xe38ce0, 64, 64, 0)
18:36:46.950 ::*0000001* :: "tsp.vrca.ru" resolved
18:36:46.950 ::*0000001* :: sending data:
18:36:46.950 ::*0000001* :: 235 (0xeb) bytes
18:36:46.950 ::*0000001* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:46.950 ::*0000001* :: POST /tsp/tsp.srf HTTP/1.1
18:36:46.950 ::*0000001* :: Content-type: application/timestamp-query
18:36:46.950 ::*0000001* :: User-Agent: Crypto-Pro tspcli.dll
18:36:46.950 ::*0000001* :: Host: tsp.vrca.ru
18:36:46.950 ::*0000001* :: Content-Length: 64
18:36:46.950 ::*0000001* :: Connection: Keep-Alive
18:36:46.950 ::*0000001* :: <<<<-------- End ----------------------------------------------->>>>
18:36:46.960 ::*0000001* :: WinHttpSendRequest() returning TRUE
18:36:46.960 ::*0000001* :: WinHttpReceiveResponse(0x49b2000, 0x0)
18:36:46.970 ::*0000001* :: received data:
18:36:46.970 ::*0000001* :: 219 (0xdb) bytes
18:36:46.970 ::*0000001* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:46.970 ::*0000001* :: HTTP/1.1 200 OK
18:36:46.970 ::*0000001* :: Via: 1.1 TEPMEL
18:36:46.970 ::*0000001* :: Connection: Keep-Alive
18:36:46.970 ::*0000001* :: Proxy-Connection: Keep-Alive
18:36:46.970 ::*0000001* :: Content-Length: 1896
18:36:46.970 ::*0000001* :: Date: Fri, 08 Sep 2006 14:36:47 GMT
18:36:46.970 ::*0000001* :: Content-Type: application/timestamp-reply
18:36:46.970 ::*0000001* :: Server: Microsoft-IIS/6.0
18:36:46.970 ::*0000001* :: <<<<-------- End ----------------------------------------------->>>>
18:36:46.970 ::*0000001* :: WinHttpReceiveResponse() returning TRUE
18:36:46.970 ::*0000001* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x489a13c, 0x12d57c [4], 0x0 [0])
18:36:46.980 ::*0000001* :: WinHttpQueryHeaders() returning TRUE
18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12d570, 0x12d58c)
18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd]
18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes() returning FALSE
18:36:46.980 ::*0000001* :: WinHttpReadData(0x49b2000, 0x48a2ff0, 65536, 0x12d57c)
18:36:46.980 ::*0000001* :: WinHttpReadData() returning TRUE
18:36:46.980 ::*0000001* :: WinHttpReadData(0x49b2000, 0x48a2ff0, 65536, 0x12d57c)
18:36:46.980 ::*0000001* :: WinHttpReadData() returning TRUE
18:36:46.980 ::*0000001* :: WinHttpCloseHandle(0x49b2000)
18:36:46.980 ::*0000001* :: WinHttpCloseHandle() returning TRUE
18:36:46.980 ::*Session* :: WinHttpCloseHandle(0xe27100)
18:36:46.980 ::*Session* :: WinHttpCloseHandle() returning TRUE
cades.dll: signatureTimeStampToken recieved and added to signature.18:36:47.260 ::*Session* :: WinHttpCrackUrl("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x0, 0x0, 0x12cd98)
18:36:47.260 ::*Session* :: WinHttpCrackUrlA("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x21, 0x0, 0x12cc50)
18:36:47.270 ::*Session* :: WinHttpCrackUrlA() returning TRUE
18:36:47.270 ::*Session* :: WinHttpCrackUrl() returning TRUE
18:36:47.270 ::*Session* :: WinHttpOpen("Crypto-Pro ocspcli.dll", (1), "", "", 0x0)
18:36:47.270 ::*Session* :: WinHttpOpen() returning handle 0xe27100
18:36:47.270 ::*Session* :: WinHttpSetOption(0xe27100, (38), 0x12cd80 [0x3], 12)
18:36:47.270 ::*Session* :: WinHttpSetOption() returning TRUE
18:36:47.270 ::*Session* :: WinHttpConnect(0xe27100, "ocsp.vrca.ru", 80, 0x0)
18:36:47.270 ::*Session* :: WinHttpConnect() returning handle 0xe27400
18:36:47.270 ::*Session* :: WinHttpOpenRequest(0xe27400, "POST", "ocsp/ocsp.srf", "", "", 0x0, 0x00000000)
18:36:47.270 ::*Session* :: WinHttpCreateUrlA(0x12cb30, 0x0, 0x4a00000, 0x12cb6c)
18:36:47.270 ::*Session* :: WinHttpCreateUrlA() returning TRUE
18:36:47.270 ::*0000002* :: WinHttpOpenRequest() returning handle 0x49b2000
18:36:47.270 ::*0000002* :: WinHttpSetOption(0x49b2000, (77), 0x12cd54 [0x2], 4)
18:36:47.270 ::*0000002* :: WinHttpSetOption() returning TRUE
18:36:47.270 ::*0000002* :: WinHttpSendRequest(0x49b2000, "Content-type: application/ocsp-request", -1, 0x4899068, 129, 129, 0)
18:36:47.270 ::*0000002* :: WinHttpCreateUrlA(0x12cacc, 0x0, 0x4a00000, 0x12cab0)
18:36:47.270 ::*0000002* :: WinHttpCreateUrlA() returning TRUE
18:36:47.270 ::*0000002* :: Using proxy server: tepmel.center.cg:8080
18:36:47.270 ::*0000002* :: "tepmel.center.cg" resolved
18:36:47.270 ::*0000002* :: sending data:
18:36:47.270 ::*0000002* :: 327 (0x147) bytes
18:36:47.280 ::*0000002* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:47.280 ::*0000002* :: POST http://ocsp.vrca.ru/ocsp/ocsp.srf HTTP/1.1
18:36:47.280 ::*0000002* :: Content-type: application/ocsp-request
18:36:47.280 ::*0000002* :: User-Agent: Crypto-Pro ocspcli.dll
18:36:47.280 ::*0000002* :: Host: ocsp.vrca.ru
18:36:47.280 ::*0000002* :: Content-Length: 129
18:36:47.280 ::*0000002* :: Proxy-Connection: Keep-Alive
18:36:47.280 ::*0000002* :: <<<<-------- End ----------------------------------------------->>>>
18:36:47.280 ::*0000002* :: WinHttpSendRequest() returning TRUE
18:36:47.280 ::*0000002* :: WinHttpReceiveResponse(0x49b2000, 0x0)
18:36:47.330 ::*0000002* :: received data:
18:36:47.330 ::*0000002* :: 217 (0xd9) bytes
18:36:47.330 ::*0000002* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:47.330 ::*0000002* :: HTTP/1.1 200 OK
18:36:47.330 ::*0000002* :: Via: 1.1 TEPMEL
18:36:47.330 ::*0000002* :: Connection: Keep-Alive
18:36:47.330 ::*0000002* :: Proxy-Connection: Keep-Alive
18:36:47.330 ::*0000002* :: Content-Length: 1612
18:36:47.330 ::*0000002* :: Date: Fri, 08 Sep 2006 14:36:47 GMT
18:36:47.330 ::*0000002* :: Content-Type: application/ocsp-response
18:36:47.340 ::*0000002* :: Server: Microsoft-IIS/6.0
18:36:47.340 ::*0000002* :: <<<<-------- End ----------------------------------------------->>>>
18:36:47.340 ::*0000002* :: WinHttpReceiveResponse() returning TRUE
18:36:47.340 ::*0000002* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x48a1248, 0x12cd58 [4], 0x0 [0])
18:36:47.340 ::*0000002* :: WinHttpQueryHeaders() returning TRUE
18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12cd4c, 0x12cd74)
18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd]
18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes() returning FALSE
18:36:47.340 ::*0000002* :: WinHttpReadData(0x49b2000, 0x48aa020, 65536, 0x12cd58)
18:36:47.340 ::*0000002* :: WinHttpReadData() returning TRUE
18:36:47.340 ::*0000002* :: WinHttpReadData(0x49b2000, 0x48aa020, 65536, 0x12cd58)
18:36:47.340 ::*0000002* :: WinHttpReadData() returning TRUE
18:36:47.340 ::*0000002* :: WinHttpCloseHandle(0x49b2000)
18:36:47.340 ::*0000002* :: WinHttpCloseHandle() returning TRUE
18:36:47.340 ::*Session* :: WinHttpCloseHandle(0xe27400)
18:36:47.340 ::*Session* :: WinHttpCloseHandle() returning TRUE
cades.dll: Certificate of OCSP service is "Nocheck".
cades.dll: stampTime > response.get_SRThisUpdate(index)cades.dll: waiting 2 seconds18:36:49.413 ::*Session* :: WinHttpCrackUrl("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x0, 0x0, 0x12cd98)
18:36:49.413 ::*Session* :: WinHttpCrackUrlA("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x21, 0x0, 0x12cc50)
18:36:49.413 ::*Session* :: WinHttpCrackUrlA() returning TRUE
18:36:49.413 ::*Session* :: WinHttpCrackUrl() returning TRUE
18:36:49.413 ::*Session* :: WinHttpSetOption(0xe27100, (38), 0x12cd80 [0x3], 12)
18:36:49.423 ::*Session* :: WinHttpSetOption() returning TRUE
18:36:49.423 ::*Session* :: WinHttpConnect(0xe27100, "ocsp.vrca.ru", 80, 0x0)
18:36:49.423 ::*Session* :: WinHttpConnect() returning handle 0xe27400
18:36:49.423 ::*Session* :: WinHttpOpenRequest(0xe27400, "POST", "ocsp/ocsp.srf", "", "", 0x0, 0x00000000)
18:36:49.423 ::*Session* :: WinHttpCreateUrlA(0x12cb30, 0x0, 0x4a00000, 0x12cb6c)
18:36:49.423 ::*Session* :: WinHttpCreateUrlA() returning TRUE
18:36:49.423 ::*0000003* :: WinHttpOpenRequest() returning handle 0x49b2000
18:36:49.423 ::*0000003* :: WinHttpSetOption(0x49b2000, (77), 0x12cd54 [0x2], 4)
18:36:49.423 ::*0000003* :: WinHttpSetOption() returning TRUE
18:36:49.423 ::*0000003* :: WinHttpSendRequest(0x49b2000, "Content-type: application/ocsp-request", -1, 0x4899068, 129, 129, 0)
18:36:49.423 ::*0000003* :: WinHttpCreateUrlA(0x12cacc, 0x0, 0x4a00000, 0x12cab0)
18:36:49.423 ::*0000003* :: WinHttpCreateUrlA() returning TRUE
18:36:49.423 ::*0000003* :: Using proxy server: tepmel.center.cg:8080
18:36:49.423 ::*0000003* :: sending data:
18:36:49.423 ::*0000003* :: 327 (0x147) bytes
18:36:49.423 ::*0000003* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:49.423 ::*0000003* :: POST http://ocsp.vrca.ru/ocsp/ocsp.srf HTTP/1.1
18:36:49.423 ::*0000003* :: Content-type: application/ocsp-request
18:36:49.423 ::*0000003* :: User-Agent: Crypto-Pro ocspcli.dll
18:36:49.423 ::*0000003* :: Host: ocsp.vrca.ru
18:36:49.423 ::*0000003* :: Content-Length: 129
18:36:49.423 ::*0000003* :: Proxy-Connection: Keep-Alive
18:36:49.423 ::*0000003* :: <<<<-------- End ----------------------------------------------->>>>
18:36:49.433 ::*0000003* :: WinHttpSendRequest() returning TRUE
18:36:49.433 ::*0000003* :: WinHttpReceiveResponse(0x49b2000, 0x0)
18:36:49.453 ::*0000003* :: received data:
18:36:49.453 ::*0000003* :: 217 (0xd9) bytes
18:36:49.453 ::*0000003* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>>
18:36:49.453 ::*0000003* :: HTTP/1.1 200 OK
18:36:49.453 ::*0000003* :: Via: 1.1 TEPMEL
18:36:49.453 ::*0000003* :: Connection: Keep-Alive
18:36:49.453 ::*0000003* :: Proxy-Connection: Keep-Alive
18:36:49.453 ::*0000003* :: Content-Length: 1612
18:36:49.453 ::*0000003* :: Date: Fri, 08 Sep 2006 14:36:49 GMT
18:36:49.453 ::*0000003* :: Content-Type: application/ocsp-response
18:36:49.453 ::*0000003* :: Server: Microsoft-IIS/6.0
18:36:49.453 ::*0000003* :: <<<<-------- End ----------------------------------------------->>>>
18:36:49.453 ::*0000003* :: WinHttpReceiveResponse() returning TRUE
18:36:49.453 ::*0000003* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x48a1248, 0x12cd58 [4], 0x0 [0])
18:36:49.453 ::*0000003* :: WinHttpQueryHeaders() returning TRUE
18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12cd4c, 0x12cd74)
18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd]
18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes() returning FALSE
18:36:49.453 ::*0000003* :: WinHttpReadData(0x49b2000, 0x48c8038, 65536, 0x12cd58)
18:36:49.453 ::*0000003* :: WinHttpReadData() returning TRUE
18:36:49.453 ::*0000003* :: WinHttpReadData(0x49b2000, 0x48c8038, 65536, 0x12cd58)
18:36:49.453 ::*0000003* :: WinHttpReadData() returning TRUE
18:36:49.453 ::*0000003* :: WinHttpCloseHandle(0x49b2000)
18:36:49.453 ::*0000003* :: WinHttpCloseHandle() returning TRUE
18:36:49.453 ::*Session* :: WinHttpCloseHandle(0xe27400)
18:36:49.453 ::*Session* :: WinHttpCloseHandle() returning TRUE
cades.dll: Certificate of OCSP service is "Nocheck".
cades.dll: stampTime > response.get_SRThisUpdate(index)cades.dll: Cannot obtain OCSP response for end certificateFirst-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: ATL::CAtlException at memory location 0x0012d5f0..
cades.dll: CAtlException, m_hr=0x800b010acades.dll: (res=0, GetLastError=0x800b010acades.dll: Exception thrown.First-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: ATL::CAtlException at memory location 0x0012df30..
cades.dll: CAtlException, m_hr=0x800b010acades.dll: (res=0, GetLastError=0x800b010aFirst-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: CUserException at memory location 0x0012e518..