Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange Utilities
  3. createdatamaps - Data Map Creation Utility
  4. DTLCCADW - Adabas PCAT Utility
  5. DTLCUIML - IMS Log Marker Utility
  6. DTLINFO - Release Information Utility
  7. DTLREXE - Remote Execution Utility
  8. DTLUAPPL - Restart Token Utility
  9. DTLUCBRG - Batch Registration Utility
  10. DTLUCDEP - CDEP Maintenance Utility
  11. DTLUCSR2 - IDMS SR2 and SR3 Records Utility
  12. DTLUCUDB - DB2 for Linux, UNIX, and Windows CDC Utility
  13. DTLULCAT and DTLULOGC - IDMS Log Catalog Utilities
  14. DTLURDMO - Data Map Utility
  15. DTLUTSK - Task Control Utility
  16. EDMLUCTR - Log Scan and Print Utility
  17. EDMXLUTL - Event Marker Utility
  18. HOSTENT - TCP/IP Address Reporter Utility
  19. PWXCATMY - MySQL Catalog Utility
  20. PWXUCCLPRT - Print Log Summary Utility
  21. PWXUCDCT - Logger for Linux, UNIX, and Windows Utility
  22. PWXUCREG - Capture Registration Suspend Utility
  23. PWXUCRGP - Capture Registrations Print Utility
  24. PWXUDMX - Data Maps Update Time ECSA Memory Utility
  25. PWXUGSK - SSL Reporting Utility for z/OS
  26. PWXUMAP - Map List Utility
  27. PWXUSSL - PowerExchange SSL Reporting Utility

Codes Report

Codes Report

The codes report shows certificate authority types and OpenSSL return codes when verification of peer certificates fails. This report shows all available return codes for the code type specified in the command that generated the report.
To generate a codes report, enter the following command:
C:\Informatica\PowerExchange
v.r.m
pwxussl CMD=ERROR_CODES ERROR_CODE_TYPE=ALL
The following output is an example of a codes report:
Processing console program. pwxussl cmd=report_codes code_type=all REPORT FOR COMMAND REPORT_CODES Report contains the following sections (1) Certificate Authority Type Codes (2) Verify Peer Certificate return codes Certificate Authority Type Codes from X509_check_ca() ===================================================== CA Description -- ----------- 0 Subject Identification 1 CA1: X509V3 CA 2 3 CA3: Self-signed X509 V1 4 CA4: Key Usage & CertSign bit 5 CA5: Netscape Type extension Verify Peer Certificate return codes ==================================== RC Description -- ----------- 0 X509_V_OK 1 UNSPECIFIED 2 UNABLE_TO_GET_ISSUER_CERT 3 UNABLE_TO_GET_CRL 4 UNABLE_TO_DECRYPT_CERT_SIGNATURE 5 UNABLE_TO_DECRYPT_CRL_SIGNATURE 6 UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY 7 CERT_SIGNATURE_FAILURE 8 CRL_SIGNATURE_FAILURE 9 CERT_NOT_YET_VALID 10 CERT_HAS_EXPIRED 11 CRL_NOT_YET_VALID 12 CRL_HAS_EXPIRED 13 ERROR_IN_CERT_NOT_BEFORE_FIELD 14 ERROR_IN_CERT_NOT_AFTER_FIELD 15 ERROR_IN_CRL_LAST_UPDATE_FIELD 16 ERROR_IN_CRL_NEXT_UPDATE_FIELD 17 OUT_OF_MEM 18 DEPTH_ZERO_SELF_SIGNED_CERT 19 SELF_SIGNED_CERT_IN_CHAIN 20 UNABLE_TO_GET_ISSUER_CERT_LOCALLY 21 UNABLE_TO_VERIFY_LEAF_SIGNATURE 22 CERT_CHAIN_TOO_LONG 23 CERT_REVOKED 24 INVALID_CA 25 PATH_LENGTH_EXCEEDED 26 INVALID_PURPOSE 27 CERT_UNTRUSTED 28 CERT_REJECTED 29 SUBJECT_ISSUER_MISMATCH 30 AKID_SKID_MISMATCH 31 AKID_ISSUER_SERIAL_MISMATCH 32 KEYUSAGE_NO_CERTSIGN 33 UNABLE_TO_GET_CRL_ISSUER 34 UNHANDLED_CRITICAL_EXTENSION 35 KEYUSAGE_NO_CRL_SIGN 36 UNHANDLED_CRITICAL_CRL_EXTENSION 37 INVALID_NON_CA 38 PROXY_PATH_LENGTH_EXCEEDED 39 KEYUSAGE_NO_DIGITAL_SIGNATURE 40 PROXY_CERTIFICATES_NOT_ALLOWED 41 INVALID_EXTENSION 42 INVALID_POLICY_EXTENSION 43 NO_EXPLICIT_POLICY 44 DIFFERENT_CRL_SCOPE 45 UNSUPPORTED_EXTENSION_FEATURE 46 UNNESTED_RESOURCE 47 PERMITTED_VIOLATION 48 EXCLUDED_VIOLATION 49 SUBTREE_MINMAX 50 APPLICATION_VERIFICATION 51 UNSUPPORTED_CONSTRAINT_TYPE 52 UNSUPPORTED_CONSTRAINT_SYNTAX 53 UNSUPPORTED_NAME_SYNTAX 54 CRL_PATH_VALIDATION_ERROR 56 SUITE_B_INVALID_VERSION 57 SUITE_B_INVALID_ALGORITHM 58 SUITE_B_INVALID_CURVE 59 SUITE_B_INVALID_SIGNATURE_ALGORITHM 60 SUITE_B_LOS_NOT_ALLOWED 61 SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 62 HOSTNAME_MISMATCH 63 EMAIL_MISMATCH 64 IP_ADDRESS_MISMATCH 65 INVALID_CALL 66 STORE_LOOKUP 67 PROXY_SUBJECT_NAME_VIOLATION

0 COMMENTS

We’d like to hear from you!