| ||||
| ||||
GetLastError() возвращает "внутренняя ошибка в цепочке сертификатов" Прошу прокомментировать ошибку. Вот Лог.. 'CryptedDocs.exe': Loaded 'C:\WINDOWS\WinSxS\x86_CryptoPro.PKI.TSP_a6d31b994cfcddc4_1.0.25.0_x-ww_b0dba329\tsp.dll', Binary was not built with debug information. 18:36:46.790 ::*Session* :: WinHttpCrackUrl("http://tsp.vrca.ru/tsp/tsp.srf", 0x0, 0x0, 0x12d5c0) 18:36:46.790 ::*Session* :: WinHttpCrackUrlA("http://tsp.vrca.ru/tsp/tsp.srf", 0x1e, 0x0, 0x12d470) 18:36:46.790 ::*Session* :: WinHttpCrackUrlA() returning TRUE 18:36:46.790 ::*Session* :: WinHttpCrackUrl() returning TRUE 18:36:46.790 ::*Session* :: WinHttpOpen("Crypto-Pro tspcli.dll", (1), "", "", 0x0) 18:36:46.790 ::*Session* :: WinHttpOpen() returning handle 0xe27000 18:36:46.790 ::*Session* :: DoConnectoidsExist() 18:36:46.800 ::*Session* :: IsRasInstalled() 18:36:46.800 ::*Session* :: IsRasInstalled() returning TRUE 18:36:46.800 ::*Session* :: DoConnectoidsExist() returning TRUE 18:36:46.890 ::*Session* :: WinHttpSetOption(0xe27000, (38), 0x12d5a4 [0x3], 12) 18:36:46.890 ::*Session* :: WinHttpSetOption() returning TRUE 18:36:46.890 ::*Session* :: WinHttpConnect(0xe27000, "tsp.vrca.ru", 80, 0x0) 18:36:46.920 ::*Session* :: WinHttpConnect() returning handle 0xe27100 18:36:46.920 ::*Session* :: WinHttpOpenRequest(0xe27100, "POST", "tsp/tsp.srf", "", "", 0x0, 0x00000000) 18:36:46.920 ::*Session* :: WinHttpCreateUrlA(0x12d350, 0x0, 0x4a00000, 0x12d38c) 18:36:46.920 ::*Session* :: WinHttpCreateUrlA() returning TRUE 18:36:46.920 ::*0000001* :: WinHttpOpenRequest() returning handle 0x49b2000 18:36:46.920 ::*0000001* :: WinHttpSetOption(0x49b2000, (77), 0x12d578 [0x2], 4) 18:36:46.920 ::*0000001* :: WinHttpSetOption() returning TRUE 18:36:46.920 ::*0000001* :: WinHttpSendRequest(0x49b2000, "Content-type: application/timestamp-query", -1, 0xe38ce0, 64, 64, 0) 18:36:46.950 ::*0000001* :: "tsp.vrca.ru" resolved 18:36:46.950 ::*0000001* :: sending data: 18:36:46.950 ::*0000001* :: 235 (0xeb) bytes 18:36:46.950 ::*0000001* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:46.950 ::*0000001* :: POST /tsp/tsp.srf HTTP/1.1 18:36:46.950 ::*0000001* :: Content-type: application/timestamp-query 18:36:46.950 ::*0000001* :: User-Agent: Crypto-Pro tspcli.dll 18:36:46.950 ::*0000001* :: Host: tsp.vrca.ru 18:36:46.950 ::*0000001* :: Content-Length: 64 18:36:46.950 ::*0000001* :: Connection: Keep-Alive 18:36:46.950 ::*0000001* :: <<<<-------- End ----------------------------------------------->>>> 18:36:46.960 ::*0000001* :: WinHttpSendRequest() returning TRUE 18:36:46.960 ::*0000001* :: WinHttpReceiveResponse(0x49b2000, 0x0) 18:36:46.970 ::*0000001* :: received data: 18:36:46.970 ::*0000001* :: 219 (0xdb) bytes 18:36:46.970 ::*0000001* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:46.970 ::*0000001* :: HTTP/1.1 200 OK 18:36:46.970 ::*0000001* :: Via: 1.1 TEPMEL 18:36:46.970 ::*0000001* :: Connection: Keep-Alive 18:36:46.970 ::*0000001* :: Proxy-Connection: Keep-Alive 18:36:46.970 ::*0000001* :: Content-Length: 1896 18:36:46.970 ::*0000001* :: Date: Fri, 08 Sep 2006 14:36:47 GMT 18:36:46.970 ::*0000001* :: Content-Type: application/timestamp-reply 18:36:46.970 ::*0000001* :: Server: Microsoft-IIS/6.0 18:36:46.970 ::*0000001* :: <<<<-------- End ----------------------------------------------->>>> 18:36:46.970 ::*0000001* :: WinHttpReceiveResponse() returning TRUE 18:36:46.970 ::*0000001* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x489a13c, 0x12d57c [4], 0x0 [0]) 18:36:46.980 ::*0000001* :: WinHttpQueryHeaders() returning TRUE 18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12d570, 0x12d58c) 18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd] 18:36:46.980 ::*0000001* :: WinHttpQueryAuthSchemes() returning FALSE 18:36:46.980 ::*0000001* :: WinHttpReadData(0x49b2000, 0x48a2ff0, 65536, 0x12d57c) 18:36:46.980 ::*0000001* :: WinHttpReadData() returning TRUE 18:36:46.980 ::*0000001* :: WinHttpReadData(0x49b2000, 0x48a2ff0, 65536, 0x12d57c) 18:36:46.980 ::*0000001* :: WinHttpReadData() returning TRUE 18:36:46.980 ::*0000001* :: WinHttpCloseHandle(0x49b2000) 18:36:46.980 ::*0000001* :: WinHttpCloseHandle() returning TRUE 18:36:46.980 ::*Session* :: WinHttpCloseHandle(0xe27100) 18:36:46.980 ::*Session* :: WinHttpCloseHandle() returning TRUE cades.dll: signatureTimeStampToken recieved and added to signature.18:36:47.260 ::*Session* :: WinHttpCrackUrl("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x0, 0x0, 0x12cd98) 18:36:47.260 ::*Session* :: WinHttpCrackUrlA("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x21, 0x0, 0x12cc50) 18:36:47.270 ::*Session* :: WinHttpCrackUrlA() returning TRUE 18:36:47.270 ::*Session* :: WinHttpCrackUrl() returning TRUE 18:36:47.270 ::*Session* :: WinHttpOpen("Crypto-Pro ocspcli.dll", (1), "", "", 0x0) 18:36:47.270 ::*Session* :: WinHttpOpen() returning handle 0xe27100 18:36:47.270 ::*Session* :: WinHttpSetOption(0xe27100, (38), 0x12cd80 [0x3], 12) 18:36:47.270 ::*Session* :: WinHttpSetOption() returning TRUE 18:36:47.270 ::*Session* :: WinHttpConnect(0xe27100, "ocsp.vrca.ru", 80, 0x0) 18:36:47.270 ::*Session* :: WinHttpConnect() returning handle 0xe27400 18:36:47.270 ::*Session* :: WinHttpOpenRequest(0xe27400, "POST", "ocsp/ocsp.srf", "", "", 0x0, 0x00000000) 18:36:47.270 ::*Session* :: WinHttpCreateUrlA(0x12cb30, 0x0, 0x4a00000, 0x12cb6c) 18:36:47.270 ::*Session* :: WinHttpCreateUrlA() returning TRUE 18:36:47.270 ::*0000002* :: WinHttpOpenRequest() returning handle 0x49b2000 18:36:47.270 ::*0000002* :: WinHttpSetOption(0x49b2000, (77), 0x12cd54 [0x2], 4) 18:36:47.270 ::*0000002* :: WinHttpSetOption() returning TRUE 18:36:47.270 ::*0000002* :: WinHttpSendRequest(0x49b2000, "Content-type: application/ocsp-request", -1, 0x4899068, 129, 129, 0) 18:36:47.270 ::*0000002* :: WinHttpCreateUrlA(0x12cacc, 0x0, 0x4a00000, 0x12cab0) 18:36:47.270 ::*0000002* :: WinHttpCreateUrlA() returning TRUE 18:36:47.270 ::*0000002* :: Using proxy server: tepmel.center.cg:8080 18:36:47.270 ::*0000002* :: "tepmel.center.cg" resolved 18:36:47.270 ::*0000002* :: sending data: 18:36:47.270 ::*0000002* :: 327 (0x147) bytes 18:36:47.280 ::*0000002* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:47.280 ::*0000002* :: POST http://ocsp.vrca.ru/ocsp/ocsp.srf HTTP/1.1 18:36:47.280 ::*0000002* :: Content-type: application/ocsp-request 18:36:47.280 ::*0000002* :: User-Agent: Crypto-Pro ocspcli.dll 18:36:47.280 ::*0000002* :: Host: ocsp.vrca.ru 18:36:47.280 ::*0000002* :: Content-Length: 129 18:36:47.280 ::*0000002* :: Proxy-Connection: Keep-Alive 18:36:47.280 ::*0000002* :: <<<<-------- End ----------------------------------------------->>>> 18:36:47.280 ::*0000002* :: WinHttpSendRequest() returning TRUE 18:36:47.280 ::*0000002* :: WinHttpReceiveResponse(0x49b2000, 0x0) 18:36:47.330 ::*0000002* :: received data: 18:36:47.330 ::*0000002* :: 217 (0xd9) bytes 18:36:47.330 ::*0000002* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:47.330 ::*0000002* :: HTTP/1.1 200 OK 18:36:47.330 ::*0000002* :: Via: 1.1 TEPMEL 18:36:47.330 ::*0000002* :: Connection: Keep-Alive 18:36:47.330 ::*0000002* :: Proxy-Connection: Keep-Alive 18:36:47.330 ::*0000002* :: Content-Length: 1612 18:36:47.330 ::*0000002* :: Date: Fri, 08 Sep 2006 14:36:47 GMT 18:36:47.330 ::*0000002* :: Content-Type: application/ocsp-response 18:36:47.340 ::*0000002* :: Server: Microsoft-IIS/6.0 18:36:47.340 ::*0000002* :: <<<<-------- End ----------------------------------------------->>>> 18:36:47.340 ::*0000002* :: WinHttpReceiveResponse() returning TRUE 18:36:47.340 ::*0000002* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x48a1248, 0x12cd58 [4], 0x0 [0]) 18:36:47.340 ::*0000002* :: WinHttpQueryHeaders() returning TRUE 18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12cd4c, 0x12cd74) 18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd] 18:36:47.340 ::*0000002* :: WinHttpQueryAuthSchemes() returning FALSE 18:36:47.340 ::*0000002* :: WinHttpReadData(0x49b2000, 0x48aa020, 65536, 0x12cd58) 18:36:47.340 ::*0000002* :: WinHttpReadData() returning TRUE 18:36:47.340 ::*0000002* :: WinHttpReadData(0x49b2000, 0x48aa020, 65536, 0x12cd58) 18:36:47.340 ::*0000002* :: WinHttpReadData() returning TRUE 18:36:47.340 ::*0000002* :: WinHttpCloseHandle(0x49b2000) 18:36:47.340 ::*0000002* :: WinHttpCloseHandle() returning TRUE 18:36:47.340 ::*Session* :: WinHttpCloseHandle(0xe27400) 18:36:47.340 ::*Session* :: WinHttpCloseHandle() returning TRUE cades.dll: Certificate of OCSP service is "Nocheck". cades.dll: stampTime > response.get_SRThisUpdate(index)cades.dll: waiting 2 seconds18:36:49.413 ::*Session* :: WinHttpCrackUrl("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x0, 0x0, 0x12cd98) 18:36:49.413 ::*Session* :: WinHttpCrackUrlA("http://ocsp.vrca.ru/ocsp/ocsp.srf", 0x21, 0x0, 0x12cc50) 18:36:49.413 ::*Session* :: WinHttpCrackUrlA() returning TRUE 18:36:49.413 ::*Session* :: WinHttpCrackUrl() returning TRUE 18:36:49.413 ::*Session* :: WinHttpSetOption(0xe27100, (38), 0x12cd80 [0x3], 12) 18:36:49.423 ::*Session* :: WinHttpSetOption() returning TRUE 18:36:49.423 ::*Session* :: WinHttpConnect(0xe27100, "ocsp.vrca.ru", 80, 0x0) 18:36:49.423 ::*Session* :: WinHttpConnect() returning handle 0xe27400 18:36:49.423 ::*Session* :: WinHttpOpenRequest(0xe27400, "POST", "ocsp/ocsp.srf", "", "", 0x0, 0x00000000) 18:36:49.423 ::*Session* :: WinHttpCreateUrlA(0x12cb30, 0x0, 0x4a00000, 0x12cb6c) 18:36:49.423 ::*Session* :: WinHttpCreateUrlA() returning TRUE 18:36:49.423 ::*0000003* :: WinHttpOpenRequest() returning handle 0x49b2000 18:36:49.423 ::*0000003* :: WinHttpSetOption(0x49b2000, (77), 0x12cd54 [0x2], 4) 18:36:49.423 ::*0000003* :: WinHttpSetOption() returning TRUE 18:36:49.423 ::*0000003* :: WinHttpSendRequest(0x49b2000, "Content-type: application/ocsp-request", -1, 0x4899068, 129, 129, 0) 18:36:49.423 ::*0000003* :: WinHttpCreateUrlA(0x12cacc, 0x0, 0x4a00000, 0x12cab0) 18:36:49.423 ::*0000003* :: WinHttpCreateUrlA() returning TRUE 18:36:49.423 ::*0000003* :: Using proxy server: tepmel.center.cg:8080 18:36:49.423 ::*0000003* :: sending data: 18:36:49.423 ::*0000003* :: 327 (0x147) bytes 18:36:49.423 ::*0000003* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:49.423 ::*0000003* :: POST http://ocsp.vrca.ru/ocsp/ocsp.srf HTTP/1.1 18:36:49.423 ::*0000003* :: Content-type: application/ocsp-request 18:36:49.423 ::*0000003* :: User-Agent: Crypto-Pro ocspcli.dll 18:36:49.423 ::*0000003* :: Host: ocsp.vrca.ru 18:36:49.423 ::*0000003* :: Content-Length: 129 18:36:49.423 ::*0000003* :: Proxy-Connection: Keep-Alive 18:36:49.423 ::*0000003* :: <<<<-------- End ----------------------------------------------->>>> 18:36:49.433 ::*0000003* :: WinHttpSendRequest() returning TRUE 18:36:49.433 ::*0000003* :: WinHttpReceiveResponse(0x49b2000, 0x0) 18:36:49.453 ::*0000003* :: received data: 18:36:49.453 ::*0000003* :: 217 (0xd9) bytes 18:36:49.453 ::*0000003* :: <<<<-------- HTTP headers follow below ----------------------------------------------->>>> 18:36:49.453 ::*0000003* :: HTTP/1.1 200 OK 18:36:49.453 ::*0000003* :: Via: 1.1 TEPMEL 18:36:49.453 ::*0000003* :: Connection: Keep-Alive 18:36:49.453 ::*0000003* :: Proxy-Connection: Keep-Alive 18:36:49.453 ::*0000003* :: Content-Length: 1612 18:36:49.453 ::*0000003* :: Date: Fri, 08 Sep 2006 14:36:49 GMT 18:36:49.453 ::*0000003* :: Content-Type: application/ocsp-response 18:36:49.453 ::*0000003* :: Server: Microsoft-IIS/6.0 18:36:49.453 ::*0000003* :: <<<<-------- End ----------------------------------------------->>>> 18:36:49.453 ::*0000003* :: WinHttpReceiveResponse() returning TRUE 18:36:49.453 ::*0000003* :: WinHttpQueryHeaders(0x49b2000, (0x20000013), "<null>", 0x48a1248, 0x12cd58 [4], 0x0 [0]) 18:36:49.453 ::*0000003* :: WinHttpQueryHeaders() returning TRUE 18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes(0x49b2000, 0x12cd4c, 0x12cd74) 18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes: error 4317 [0x10dd] 18:36:49.453 ::*0000003* :: WinHttpQueryAuthSchemes() returning FALSE 18:36:49.453 ::*0000003* :: WinHttpReadData(0x49b2000, 0x48c8038, 65536, 0x12cd58) 18:36:49.453 ::*0000003* :: WinHttpReadData() returning TRUE 18:36:49.453 ::*0000003* :: WinHttpReadData(0x49b2000, 0x48c8038, 65536, 0x12cd58) 18:36:49.453 ::*0000003* :: WinHttpReadData() returning TRUE 18:36:49.453 ::*0000003* :: WinHttpCloseHandle(0x49b2000) 18:36:49.453 ::*0000003* :: WinHttpCloseHandle() returning TRUE 18:36:49.453 ::*Session* :: WinHttpCloseHandle(0xe27400) 18:36:49.453 ::*Session* :: WinHttpCloseHandle() returning TRUE cades.dll: Certificate of OCSP service is "Nocheck". cades.dll: stampTime > response.get_SRThisUpdate(index)cades.dll: Cannot obtain OCSP response for end certificateFirst-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: ATL::CAtlException at memory location 0x0012d5f0.. cades.dll: CAtlException, m_hr=0x800b010acades.dll: (res=0, GetLastError=0x800b010acades.dll: Exception thrown.First-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: ATL::CAtlException at memory location 0x0012df30.. cades.dll: CAtlException, m_hr=0x800b010acades.dll: (res=0, GetLastError=0x800b010aFirst-chance exception at 0x7c812a5b in CryptedDocs.exe: Microsoft C++ exception: CUserException at memory location 0x0012e518.. |