hello to all;

I am trying to create a NDS-to-NDS Certificates. During this proccess I am
getting this messages (the last two).

Thursday, Jun 28, 2007
14:10:25 879BF380 PKI: Entering PKI_GetWorkingCAs
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Original ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: GetSecurityObjectName: Security Container type
SAS:Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCADN = TEST_TREE
Organizational CA.Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCA host Server =
TST-NW02.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Server is not the host server!
Try #1
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retrying operation with server
last contacted.
14:10:25 879BF380 PKI: Entering PKI_GetServerFromCAInfo
14:10:25 879BF380 PKI: PKI_GetServerFromCAInfo: serverDN is
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetServerFromCAInfo: Mission Accomplished
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retry ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: GetSecurityObjectName: Security Container type
SAS:Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCADN = TEST_TREE
Organizational CA.Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCA host Server =
TST-NW02.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Server is not the host server!
Try #2
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retry didn't work; server is not
the Org CA
14:10:25 879BF380 PKI: PKI_StoreCAInfo: ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_StoreCAInfo: Mission Accomplished
14:10:25 879BF380 PKI: Exiting PKI_GetWorkingCAs ccode = 0
14:10:25 879BF380 PKI: Entering PKI_ReadMachineUniqueCA()...
14:10:25 879BF380 PKI: PKI_ReadMachineUniqueCA() returned 0
14:10:25 879BF380 PKI: Entering x509Decode
14:10:25 879BF380 PKI: certDataLen 1114
14:10:25 879BF380 PKI: 1st check succeeded
14:10:25 879BF380 PKI: 2nd check succeeded
14:10:25 879BF380 PKI: curMax 1110
14:10:25 879BF380 PKI: 3rd check succeeded
14:10:25 879BF380 PKI: curMax 998
14:10:25 879BF380 PKI: 4th check succeeded
14:10:25 879BF380 PKI: Malloc succeeded
14:10:25 879BF380 PKI: Entering PKI_GetWorkingCAs
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Original ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: GetSecurityObjectName: Security Container type
SAS:Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCADN = TEST_TREE
Organizational CA.Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCA host Server =
TST-NW02.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Server is not the host server!
Try #1
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retrying operation with server
last contacted.
14:10:25 879BF380 PKI: Entering PKI_GetServerFromCAInfo
14:10:25 879BF380 PKI: PKI_GetServerFromCAInfo: serverDN is
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetServerFromCAInfo: Mission Accomplished
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retry ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: GetSecurityObjectName: Security Container type
SAS:Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCADN = TEST_TREE
Organizational CA.Security
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: treeCA host Server =
TST-NW02.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Server is not the host server!
Try #2
14:10:25 879BF380 PKI: PKI_GetWorkingCAs: Retry didn't work; server is not
the Org CA
14:10:25 879BF380 PKI: PKI_StoreCAInfo: ServerDN =
TST_NW04.vpc.gta.Enbridge
14:10:25 879BF380 PKI: PKI_StoreCAInfo: Mission Accomplished
14:10:25 879BF380 PKI: Exiting PKI_GetWorkingCAs ccode = 0
14:10:25 87C78600 PKI: Entering PKIWireRequest
14:10:25 87C78600 PKI: Entering PKIVerbHandOff
14:10:25 87C78600 PKI: PKIVerbHandOff calling verb 14
14:10:25 87C78600 PKI: Entering _PKISGetIPAndDNSAddresses
14:10:25 87C78600 PKI: Host name = TST_NW04
14:10:25 87C78600 PKI: Reading IP Addresses ...
14:10:25 87C78600 PKI: WSALookupServiceBegin successful
14:10:34 87C78600 PKI: WSALookupServiceNext successful
14:10:34 87C78600 PKI: HostAddress:
14:10:34 87C78600 PKI: 10.
14:10:34 87C78600 PKI: 170.
14:10:34 87C78600 PKI: 4.
14:10:34 87C78600 PKI: 98
14:10:34 87C78600 PKI: -Ignoring duplicate IP address:
14:10:34 87C78600 PKI: 10.
14:10:34 87C78600 PKI: 170.
14:10:34 87C78600 PKI: 4.
14:10:34 87C78600 PKI: 98
14:10:34 87C78600 PKI: WSALookupServiceNext successful
14:10:34 87C78600 PKI: -Ignoring duplicate IP address:
14:10:34 87C78600 PKI: 10.
14:10:34 87C78600 PKI: 170.
14:10:34 87C78600 PKI: 4.
14:10:34 87C78600 PKI: 98
14:10:34 87C78600 PKI: WSALookupServiceNext error -1
14:10:34 87C78600 PKI: WSAGetLastError -- 10110 -- no more data (Normal
Error)
14:10:34 87C78600 PKI: WSALookupServiceEnd
14:10:34 87C78600 PKI: Reading DNS Addresses ...
14:10:34 87C78600 PKI: WSALookupServiceBegin successful
14:10:34 87C78600 PKI: WSALookupServiceNext successful
14:10:34 87C78600 PKI: DNS Name for IP Address 10.170.4.98 =
TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: WSALookupServiceNext error -1
14:10:34 87C78600 PKI: WSAGetLastError -- 10110 -- no more data (Normal
Error)
14:10:34 87C78600 PKI: WSALookupServiceEnd
14:10:34 87C78600 PKI: GetIPAndDNSAddresses returning (0)
14:10:34 87C78600 PKI: _PKISGetIPAndDNSAddresses returning (0)
14:10:34 87C78600 PKI: PKIVerbHandOff returned 0
14:10:34 87C78600 PKI: Exiting PKIVerbHandOff rc = 0
14:10:34 87C78600 PKI: Exiting PKIWireRequest err = 0
14:10:34 93CA83A0 PKIAPI: Entering CreateServerCertificate
14:10:34 93CA83A0 PKIAPI: Basic Constraints not specified -- using
defaults
14:10:34 93CA83A0 PKIAPI: 1 Subject Alternative Names
14:10:34 93CA83A0 PKIAPI: DSRightsServerDN:
CN=TST_NW04.OU=vpc.OU=gta.O=Enbridge
14:10:34 93CA83A0 PKIAPI: Key Generation Server DN:
TST_NW04.vpc.gta.Enbridge
14:10:34 93CA83A0 PKIAPI: CAServerVersion 132872
14:10:34 93CA83A0 PKIAPI: Rolling back requestVersionNumber to 4
14:10:34 93CA83A0 PKIAPI: Signing Server DN:
CN=TST-NW02.OU=vpc.OU=gta.O=Enbridge
14:10:34 93CA83A0 PKIAPI: requestVerion:4 keyType:1 keySize:4096
14:10:34 93CA83A0 PKIAPI: keyPairType:1 privateKeyFlags:6
publicKeyFlags:4372
14:10:34 93CA83A0 PKIAPI: signatureAlgorithm:4 flags:0
14:10:34 93CA83A0 PKIAPI: validFrom:1183054225 Thu Jun 28 18:10:25 2007
14:10:34 93CA83A0 PKIAPI: validTo:1246212625 Sun Jun 28 18:10:25 2009
14:10:34 93CA83A0 PKIAPI: subjectDN:
.O=test_tree.CN=TST_NW04.cgc.enbridge.com
14:10:34 93CA83A0 PKIAPI: Certificate name: egddrp(TST_NW04_kmo)
14:10:34 93CA83A0 PKIAPI: DSRightsServerDN:
CN=TST_NW04.OU=vpc.OU=gta.O=Enbridge
14:10:34 87C78600 PKI: Entering PKIWireRequest
14:10:34 87C78600 PKI: Entering PKIVerbHandOff
14:10:34 87C78600 PKI: PKIVerbHandOff calling verb 3
14:10:34 87C78600 PKI: Entering _PKICreateKeyPair: ...versionNumber = 4
14:10:34 87C78600 PKI: CKP: v-4
14:10:34 87C78600 PKI: kt-1
14:10:34 87C78600 PKI: ks-4096
14:10:34 87C78600 PKI: kptype-1
14:10:34 87C78600 PKI: prvKF-6
14:10:34 87C78600 PKI: pubKF-1114
14:10:34 87C78600 PKI: sa-4
14:10:34 87C78600 PKI: dF-x0
14:10:34 87C78600 PKI: vf-x4683F991
14:10:34 87C78600 PKI: vt-x4A47B211
14:10:34 87C78600 PKI: CKP: subjLen-41
14:10:34 87C78600 PKI: subjectDN-.O=test_tree.CN=TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: CKP: opaqLen-20
14:10:34 87C78600 PKI: opaqueOrNickName-egddrp(TST_NW04_kmo)
14:10:34 87C78600 PKI: CKP: targetedDN-
14:10:34 87C78600 PKI:
contactServerDN-CN=TST_NW04.OU=vpc.OU=gta.O=Enbridge
14:10:34 87C78600 PKI: Entering PKI_CreateKeyPair...
14:10:34 87C78600 PKI: Key Type Check Passes...
14:10:34 87C78600 PKI: Key Pair Type Check 1 Passes...
14:10:34 87C78600 PKI: Private Key Check 1 Passes...
14:10:34 87C78600 PKI: Private Key Check 2 Passes...
14:10:34 87C78600 PKI: Public Key Check 1 Passes...
14:10:34 87C78600 PKI: Public Key Check 2 Passes...
14:10:34 87C78600 PKI: Key Pair Type Check 2 Passes...
14:10:34 87C78600 PKI: Public Key Check 3 Passes...
14:10:34 87C78600 PKI: Public Key Check 4 Passes...
14:10:34 87C78600 PKI: Public Key Check 5 Passes...
14:10:34 87C78600 PKI: Public Key Check 6 Passes...
14:10:34 87C78600 PKI: Signature Algorithm Passes...
14:10:34 87C78600 PKI: Key Usage Extension Passes...
14:10:34 87C78600 PKI: Key Pair Type Check 3 Passes...
14:10:34 87C78600 PKI: Key Pair Type Check 4 Passes...
14:10:34 87C78600 PKI: PKI_CreateKeyPair: attempting to connect to contact
server CN=TST_NW04.OU=vpc.OU=gta.O=Enbridge
14:10:34 87C78600 PKI: PKI_CreateKeyPair: typed server DN is
CN=TST_NW04.OU=vpc.OU=gta.O=Enbridge
14:10:34 87C78600 PKI: PKI_CreateKeyPair: Setting subject name to
.O=test_tree.CN=TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: Entering getNextNameComponent...
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed:
.O=test_tree.CN=TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: getNameOID: incoming token is O=
14:10:34 87C78600 PKI: getNextNameComponent: name=
14:10:34 87C78600 PKI: t
14:10:34 87C78600 PKI: e
14:10:34 87C78600 PKI: s
14:10:34 87C78600 PKI: t
14:10:34 87C78600 PKI: _
14:10:34 87C78600 PKI: t
14:10:34 87C78600 PKI: r
14:10:34 87C78600 PKI: e
14:10:34 87C78600 PKI: e
14:10:34 87C78600 PKI: -- found '.' checking for new token.
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed:
.CN=TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: getNameOID: incoming token is CN=
14:10:34 87C78600 PKI:
14:10:34 87C78600 PKI: getNextNameComponent: 12 parsed
14:10:34 87C78600 PKI: getNextNameComponent: rc = 0
14:10:34 87C78600 PKI: Entering getNextNameComponent...
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed:
.CN=TST_NW04.cgc.enbridge.com
14:10:34 87C78600 PKI: getNameOID: incoming token is CN=
14:10:34 87C78600 PKI: getNextNameComponent: name=
14:10:34 87C78600 PKI: T
14:10:34 87C78600 PKI: S
14:10:34 87C78600 PKI: T
14:10:34 87C78600 PKI: _
14:10:34 87C78600 PKI: N
14:10:34 87C78600 PKI: W
14:10:34 87C78600 PKI: 0
14:10:34 87C78600 PKI: 4
14:10:34 87C78600 PKI: -- found '.' checking for new token.
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed:
.cgc.enbridge.com
14:10:34 87C78600 PKI: getNameOID: incoming name did end with an =
14:10:34 87C78600 PKI: .
14:10:34 87C78600 PKI: c
14:10:34 87C78600 PKI: g
14:10:34 87C78600 PKI: c
14:10:34 87C78600 PKI: -- found '.' checking for new token.
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed:
.enbridge.com
14:10:34 87C78600 PKI: getNameOID: incoming name did end with an =
14:10:34 87C78600 PKI: .
14:10:34 87C78600 PKI: e
14:10:34 87C78600 PKI: n
14:10:34 87C78600 PKI: b
14:10:34 87C78600 PKI: r
14:10:34 87C78600 PKI: i
14:10:34 87C78600 PKI: d
14:10:34 87C78600 PKI: g
14:10:34 87C78600 PKI: e
14:10:34 87C78600 PKI: -- found '.' checking for new token.
14:10:34 87C78600 PKI: Entering getNameOID - name to be parsed: .com
14:10:34 87C78600 PKI: getNameOID: incoming name did end with an =
14:10:34 87C78600 PKI: .
14:10:34 87C78600 PKI: c
14:10:34 87C78600 PKI: o
14:10:34 87C78600 PKI: m
14:10:34 87C78600 PKI:
14:10:34 87C78600 PKI: getNextNameComponent: 29 parsed
14:10:34 87C78600 PKI: getNextNameComponent: rc = 0
14:10:34 87C78600 PKI: Entering createServerCSR...
14:10:34 87C78600 PKI: Entering PKI_CreateKMO()...
14:10:34 87C78600 PKI: PKI_CreateKMO: The assembled DN of the KMO is
egddrp(TST_NW04_kmo) - TST_NW04.vpc.gta.Enbridge
14:10:34 87C78600 PKI: PKI_GetRightsForConnection: Getting rights for
connection = 29
14:10:34 87C78600 PKI: object name = vpc.gta.Enbridge
14:10:34 87C78600 PKI: attr name = [Entry Rights]
14:10:34 87C78600 PKI: PKI_GetRightsForConnection: Got conn authenticated
ID 8063
14:10:34 87C78600 PKI: PKI_GetRightsForConnection: Got local name
admin.Enbridge
14:10:34 87C78600 PKI: Exiting PKI_GetRightsForConnection with Privileges:
1f
14:10:34 87C78600 PKI: PKI_CreateKMO: DDCModifyEntry for KMO returned 0
14:10:34 87C78600 PKI: Entering LinkKMOtoSAS()...
14:10:34 87C78600 PKI: LinkKMOtoSAS: attempting to resolve name to server
DN TST_NW04.vpc.gta.Enbridge
14:10:34 87C78600 PKI: LinkKMOtoSAS: The name of the server's SAS object
is SAS Service - TST_NW04.vpc.gta.Enbridge
14:10:34 87C78600 PKI: LinkKMOtoSAS: Modify of SAS object successful
14:10:34 87C78600 PKI: Exiting LinkKMOtoSAS() with 0
14:10:34 87C78600 PKI: Exiting PKI_CreateKMO with status 0
14:10:34 87C78600 PKI: createServerCSR: KMO with name egddrp(TST_NW04_kmo)
- TST_NW04.vpc.gta.Enbridge created.
14:10:34 87C78600 PKI: Entering createKPandCSR()...
14:10:34 87C78600 PKI: Entering generateRSAKeyPair, key usages = 0x14400D4
...

--------------------------------------------------------------------------------
14:12:38 87C78600 PKI: generateRSAKeyPair: rc = 0
14:12:38 87C78600 PKI: Entering getKeyPair...
14:12:38 87C78600 PKI: Entering getWrappingKey...
14:12:38 87C78600 PKI: getWrappingKey: ccode = 0
14:12:38 87C78600 PKI: getKeyPair: wrappedPrivKeyLen = 2620
14:12:38 87C78600 PKI: getKeyPair: rawPubKeyLen = 550
14:12:38 87C78600 PKI: getKeyPair: rc = 0
14:12:38 87C78600 PKI: Entering PKI_CreateCSR...
14:12:38 87C78600 PKI: Allocating CSR buffer of size of 2314
14:12:38 87C78600 PKI: Encoded CSR length is 1153
14:12:38 87C78600 PKI: PKI_CreateCSR: rc = 0
14:12:38 87C78600 PKI: createKPandCSR() completed. rc = 0
14:12:38 87C78600 PKI: Entering getKeyPair...
14:12:38 87C78600 PKI: Entering getWrappingKey...
14:12:38 87C78600 PKI: getWrappingKey: ccode = 0
14:12:38 87C78600 PKI: getKeyPair: wrappedPrivKeyLen = 2620
14:12:38 87C78600 PKI: getKeyPair: rawPubKeyLen = 550
14:12:38 87C78600 PKI: getKeyPair: rc = 0
14:12:38 87C78600 PKI: PKI_StoreServerAndKMOInfo: KmoDN =
egddrp(TST_NW04_kmo) - TST_NW04.vpc.gta.Enbridge
14:12:38 87C78600 PKI: PKI_StoreServerAndKMOInfo: ServerDN =
TST_NW04.vpc.gta.Enbridge
14:12:38 87C78600 PKI: PKI_StoreServerAndKMOInfo: Saving the names in slot
4
14:12:38 87C78600 PKI: PKI_StoreServerAndKMOInfo: Mission Accomplished
14:12:38 87C78600 PKI: createServerCSR() completed. rc = 0
14:12:38 87C78600 PKI: Entering signDataWithMachineUCA()....
14:12:38 87C78600 PKI: signDataWithMachineUCA: Getting 3 chain
certificates.
14:12:38 87C78600 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1294.
14:12:38 87C78600 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1174.
14:12:38 87C78600 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1114.
Thursday, Jun 28, 2007
14:12:38 87C78600 PKI: Entering signData()....
14:12:38 87C78600 PKI: signData() completed. rc = 0
14:12:38 87C78600 PKI: signDataWithMachineUCA() completed. rc = 0
14:12:38 87C78600 PKI: PKI_CreateKeyPair() completed. rc = 0
14:12:38 87C78600 PKI: Exiting _PKICreateKeyPair: err = 0
14:12:38 87C78600 PKI: PKIVerbHandOff returned 0
14:12:38 87C78600 PKI: Exiting PKIVerbHandOff rc = 0
14:12:38 87C78600 PKI: Exiting PKIWireRequest err = 0
14:12:38 93CA83A0 PKIAPI: NWCPKIFragmentRequest for Create KeyPair
returned 0
14:12:38 93CA83A0 PKIAPI: Starting Sign NCP using NCP version 2
14:12:38 96D02120 PKI: Entering PKIWireRequest
14:12:38 96D02120 PKI: Entering PKIVerbHandOff
14:12:38 96D02120 PKI: PKIVerbHandOff calling verb 13
14:12:38 96D02120 PKI: Entering _PKISProveIdentity
14:12:38 96D02120 PKI: Entering signDataWithMachineUCA()....
14:12:38 96D02120 PKI: signDataWithMachineUCA: Getting 3 chain
certificates.
14:12:38 96D02120 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1294.
14:12:38 96D02120 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1174.
14:12:38 96D02120 PKI: signDataWithMachineUCA: Got a chain certificate of
length 1114.
14:12:38 96D02120 PKI: Entering signData()....
14:12:38 96D02120 PKI: signData() completed. rc = 0
14:12:38 96D02120 PKI: signDataWithMachineUCA() completed. rc = 0
14:12:38 96D02120 PKI: _PKISProveIdentity returning (0)
14:12:38 96D02120 PKI: PKIVerbHandOff returned 0
14:12:38 96D02120 PKI: Exiting PKIVerbHandOff rc = 0
14:12:38 96D02120 PKI: Exiting PKIWireRequest err = 0
14:12:38 93CA83A0 PKIAPI: NWCPKIFragmentRequest for Sign Certificate
returned -1400
14:12:38 93CA83A0 PKIAPI: Exiting CreateServerCertificate with ccode -1400

Please any ideas. I did this in both ends(servers) getting the same
messages.

Thanks,
Julio