[Pki-users] Dogtag TPS wizard - java.lang.NullPointerException on last button

Fabian Bertholm fabeisageek at googlemail.com
Fri Nov 12 10:40:34 UTC 2010


Hi,

I stepped back with my VM to a clean state and tried and debugged it again.
It seems that the reported exception resultet from an unclean state of
the system after the first bug.
The initial point were it all stops is at the DonePanel.pm:169
[Wed Nov 10 18:10:55 2010] -e: Use of uninitialized value $content in
concatenation (.) or string at
/var/lib/pki-tps/lib/perl/PKI/TPS/DonePanel.pm line 169.

I have debugged a little bit into the code and I can see that this
line is called three times.
The first call gets a cert from the ca, this seems working now for the
first time! When I try to do the same call again with the shell I get
the same Java exception as before. The next two calls try to get a
certificate from the tks und the kra. These calls to sslget fail. I
copied out the call and when using the shell by hand it looks like
this on kra and tks:

exit after PR_Write bigBuf with error -5938:

When opening the secure agent port with firefox this fails too.
Nevertheless pkiconsole on the TKS and KRA instances seems to be ok
for me.

/usr/bin/sslget -e "uid=TPS-pki-server1-7889&name=Token Processing
Subsystem&certificate=%0AMIIDxDCCAqygAwIBAgIBGTANBgkqhkiG9w0BAQsFADBcMSYwJAYDVQQKEx1hZHN0%0D%0AZWMgU1QgVGVzdCBTdWJDQSAxIERvbWFpbjESMBAGA1UECxMJcGtpLXN1YmNhMR4w%0D%0AHAYDVQQDExVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMTAxMTEwMTY1ODM5WhcN%0D%0AMTIxMDMwMTU0MzQyWjBeMSYwJAYDVQQKEx1hZHN0ZWMgU1QgVGVzdCBTdWJDQSAx%0D%0AIERvbWFpbjEQMA4GA1UECxMHcGtpLXRwczEiMCAGA1UEAxMZVFBTIFN1YnN5c3Rl%0D%0AbSBDZXJ0aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3Q%0D%0AcZLS9BEd8jRONyQFB31ouHbO0xB2Y6ligvf6r3yQLDwwyuMrqIG%2FvHdSngFSyMUT%0D%0AHBZ7c%2FZnVi%2BK%2FgTbMVc0OBH%2FdH9PT%2FCCxGZ6zKWTCQJXbGk2imCe%2FKkYzd1XwBAc%0D%0AHrrarptqUv1IUX9NMPMlhjHZBvZ19HsC2QOHD4RaNGSlOWSKJDuXFqi2xEJsA1hH%0D%0AN0CkGaRmoRZYxZu6mgiH4lIl0xJ%2FbIC5rhi6bspzovudSEKGgn%2B35b57UvYi0RRG%0D%0AwOx1%2FYyNYXrWKEte0MiXqNORIW89aexx0eMUK4eTOeZFCEgiQcSBT2AWOIN9Z6HM%0D%0AtGrUVWrfwF3tUsEy69sCAwEAAaOBjjCBizAfBgNVHSMEGDAWgBSrCUp6f0Motmdc%0D%0A8dyKBDh3I4DEcjBDBggrBgEFBQcBAQQ3MDUwMwYIKwYBBQUHMAGGJ2h0dHA6Ly9h%0D%0AZHMtdGVjLXBraS1zZXJ2ZXIxOjk1ODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAw%0D%0AEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEMX6VF9lBWt%0D%0AiD9DLa2sD%2Faq5ZC8tGWIdSzdOXG3289Y%2BlFfySNQV7xSLZ5sqjOl0KtKGs6vBZUw%0D%0Apb2wgdlb8yaZH9cDiZYPvxeQMQIv5VykUpffMrXNJ8jbHDxdZzL9ugJj67sesOG8%0D%0AHUfAVYEkToxCesYiA0pH1tA22s2UZoQz9IdVKAkMh%2FLE0HU%2FI8gN7cda5c4oI1x0%0D%0Azt%2BV0INU8NbWTMhC5z0hEYdhMSS3d4zMX1%2BYqL%2BCjCqViRQOwjq4pqux8YLqmlkh%0D%0A2bfI2qLYZTUnd0Hlx9ZG107kGQu4aBVxnrNHGa3vuySmv6tUIjfkmuo3BN9uTg2y%0D%0A1tj7Fc76%2FDA%3D&xmlOutput=true&sessionID=4612580003447971825&auth_hostname=pki-server1&auth_port=9544"
-d "/var/lib/pki-tps/alias" -p "618281087997" -v -n "Server-Cert
cert-pki-tps" -r "/kra/admin/kra/registerUser" pki-server1:10443
POST /kra/admin/kra/registerUser HTTP/1.0
Content-Length: 1624
Content-Type: application/x-www-form-urlencoded

uid=TPS-pki-server1-7889&name=Token Processing
Subsystem&certificate=%0AMIIDxDCCAqygAwIBAgIBGTANBgkqhkiG9w0BAQsFADBcMSYwJAYDVQQKEx1hZHN0%0D%0AZWMgU1QgVGVzdCBTdWJDQSAxIERvbWFpbjESMBAGA1UECxMJcGtpLXN1YmNhMR4w%0D%0AHAYDVQQDExVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMTAxMTEwMTY1ODM5WhcN%0D%0AMTIxMDMwMTU0MzQyWjBeMSYwJAYDVQQKEx1hZHN0ZWMgU1QgVGVzdCBTdWJDQSAx%0D%0AIERvbWFpbjEQMA4GA1UECxMHcGtpLXRwczEiMCAGA1UEAxMZVFBTIFN1YnN5c3Rl%0D%0AbSBDZXJ0aWZpY2F0ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3Q%0D%0AcZLS9BEd8jRONyQFB31ouHbO0xB2Y6ligvf6r3yQLDwwyuMrqIG%2FvHdSngFSyMUT%0D%0AHBZ7c%2FZnVi%2BK%2FgTbMVc0OBH%2FdH9PT%2FCCxGZ6zKWTCQJXbGk2imCe%2FKkYzd1XwBAc%0D%0AHrrarptqUv1IUX9NMPMlhjHZBvZ19HsC2QOHD4RaNGSlOWSKJDuXFqi2xEJsA1hH%0D%0AN0CkGaRmoRZYxZu6mgiH4lIl0xJ%2FbIC5rhi6bspzovudSEKGgn%2B35b57UvYi0RRG%0D%0AwOx1%2FYyNYXrWKEte0MiXqNORIW89aexx0eMUK4eTOeZFCEgiQcSBT2AWOIN9Z6HM%0D%0AtGrUVWrfwF3tUsEy69sCAwEAAaOBjjCBizAfBgNVHSMEGDAWgBSrCUp6f0Motmdc%0D%0A8dyKBDh3I4DEcjBDBggrBgEFBQcBAQQ3MDUwMwYIKwYBBQUHMAGGJ2h0dHA6Ly9h%0D%0AZHMtdGVjLXBraS1zZXJ2ZXIxOjk1ODAvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAw%0D%0AEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEMX6VF9lBWt%0D%0AiD9DLa2sD%2Faq5ZC8tGWIdSzdOXG3289Y%2BlFfySNQV7xSLZ5sqjOl0KtKGs6vBZUw%0D%0Apb2wgdlb8yaZH9cDiZYPvxeQMQIv5VykUpffMrXNJ8jbHDxdZzL9ugJj67sesOG8%0D%0AHUfAVYEkToxCesYiA0pH1tA22s2UZoQz9IdVKAkMh%2FLE0HU%2FI8gN7cda5c4oI1x0%0D%0Azt%2BV0INU8NbWTMhC5z0hEYdhMSS3d4zMX1%2BYqL%2BCjCqViRQOwjq4pqux8YLqmlkh%0D%0A2bfI2qLYZTUnd0Hlx9ZG107kGQu4aBVxnrNHGa3vuySmv6tUIjfkmuo3BN9uTg2y%0D%0A1tj7Fc76%2FDA%3D&xmlOutput=true&sessionID=4612580003447971825&auth_hostname=pki-server1&auth_port=9544port:
10443
addr='pki-server1'
family='2'
exit after PR_Write bigBuf with error -5938:




More information about the Pki-users mailing list