03353001 Insufficient memory is available.

Explanation

There is not enough memory available to allocate a required control block or data element.

User response

Increase the memory available to the application and then retry the request. Contact your service representative if the error persists.

03353002 Certificate extension is not supported.

Explanation

An X.509 certificate extension is either not supported by the current level of the System SSL run time or is not supported by the certificate version. The certificate extension is not processed. If the extension is marked as a critical extension, the X.509 certificate cannot be processed.

User response

Upgrade the System SSL run time if a later software level supports the certificate extension.

03353003 Cryptographic algorithm is not supported.

Explanation

An X.509 cryptographic algorithm is not supported by the current level of the System SSL run time. This error can also occur if the current operation does not support the specified cryptographic algorithm. When running in FIPS mode, this error may occur if an attempt is made to use an algorithm that is not supported in FIPS mode.

User response

Ensure that the cryptographic algorithm is supported for the requested operation or that it is supported if executing in FIPS mode. Upgrade the System SSL run time if a later software level supports the cryptographic algorithm.

03353004 Signature is not correct

Explanation

The signature is incorrect for an X.509 certificate or certificate revocation list. This usually means that the certificate has been modified since it was signed by the issuing Certificate Authority.

User response

Verify that the certificate has not been modified. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353005 Cryptographic request failed.

Explanation

A cryptographic request failed with an unexpected error.

User response

Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353006 Input/Output request canceled.

Explanation

An input/output operation is canceled by the user. This can occur if the user cancels a terminal read request by pressing an attention key or by pressing the enter key without entering any data.

User response

None

03353007 Input/Output request failed.

Explanation

An input/output operation fails.

User response

Verify that the file or key ring can be accessed and is not damaged. If creating or updating a file, verify that the file system containing the file is not full. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353008 Verification password does not match.

Explanation

The user is prompted to verify the password by entering it a second time. The user did not enter the same password both times.

User response

Enter the same password when prompted.

03353009 File or keyring not found

Explanation

A file or key ring cannot be opened because it is not found.

User response

Verify that the correct name is specified. This value is case-sensitive. Ensure that the case is preserved with your request. Contact your service representative if the error persists.

0335300A Database is not valid.

Explanation

The key database or the request database is not valid. This error can occur if the wrong database password is used when opening the database or if the database format is not supported by the current level of the System SSL run time.

User response

Verify that the database has not been modified or truncated. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

0335300B Message not found.

Explanation

The System SSL run time is unable to locate a message in the message catalog.

User response

Verify that the message catalog can be accessed by the application and can be located using the NLSPATH environment variable. Contact your service representative if the error persists.

0335300C Handle is not valid.

Explanation

The handle that is passed to the System SSL run time is not valid. This error can occur if the handle is closed or is not the proper type for the requested function.

User response

Pass a valid handle to the System SSL routine.

0335300D Record deleted.

Explanation

The requested record is deleted.

User response

None

0335300E Record not found.

Explanation

The requested record is not found.

User response

Start of changeIf using RACF key rings, certificates that are marked as not trusted in the RACF database are not retrieved from the key ring. Ensure that the certificates needed to build the certificate’s trust chain are available.End of change

Start of changeIf using RACF key rings and the DIGTCERT and DIGTRING classes are RACLIST'ed, issue the SETROPTS RACLIST (DIGTCERT, DIGTRING) REFRESH command to refresh the profiles to ensure that the latest changes are available.End of change

Start of changeIf generic profiling checking was enabled for the DIGTCERT class when the certificate was created or added and its issuer's distinguished name contains any generic characters (*, & and %), a generic certificate profile was created. This generic profile processing may cause the certificate not to be read from the key ring. This certificate will need to be removed and added back after turning off generic profile checking for DIGTCERT class. The SEARCH CLASS(DIGTCERT) command can be used to determine if the certificate’s profile is generic. A (G) indicates generic.End of change

0335300F Incorrect database type

Explanation

The database does not support the requested operation. This error can occur if the database type is not valid. It can also occur if an attempt is made to add a request record to a key database or a key record to a request database.

User response

Specify an operation supported by the database.

03353010 Database is not open for update.

Explanation

A request to modify the key or request database cannot be completed because update mode was not requested when the database was opened or an update was requested on a FIPS mode database while in non-FIPS mode.

User response

Request update mode when opening a database for modification.

03353011 Mutex request failed.

Explanation

A mutex operation failed.

User response

Contact your service representative.

03353012 Backup file already exists.

Explanation

Before updating a database file, the System SSL run time creates a backup file with the same name with ".new" appended to the name. This file is then deleted after the database file has been rewritten. The file is not deleted if an error occurs while rewriting the database file.

User response

Correct the problem that caused the database update to fail. Then copy the backup file to the database file and delete the backup file.

03353013 Database already exists.

Explanation

A request to create a new database cannot be completed because the database file already exists.

User response

Choose a different name for the new database or delete the existing database.

03353014 Record is too big.

Explanation

A new record cannot be added to the database because it is larger than the database record length.

User response

If using the gskkyman utility, use option 4 from the Database Menu to enlarge the database record length. Applications using the System SSL APIs can use the gsk_change_database_record_length API to enlarge the database record length.

03353015 Database password is expired.

Explanation

The database password is expired.

User response

Change the database password.

03353016 The password is not correct.

Explanation

The wrong password is specified for a key database, an encrypted private key, or an import file. This error can also occur if the file has been modified. Also, this error can occur if the key that is being exported is a secure private key in the TKDS and the specified password length is greater than 63 bytes.

User response

Specify the correct password.

03353017 Access denied.

Explanation

The database or key ring cannot be opened because the permissions do not allow access by the current user.

User response

Ensure that the user has read/write access to the database if opening the database for update mode; otherwise ensure that the user has read access to the database or key ring.

03353018 Database is locked for update.

Explanation

Another process has opened the database in update mode. Only one process may have the database open for update at a time.

User response

Wait until the database has been closed by the other process and then retry the request.

03353019 Record length is too small.

Explanation

The database record length is less than the minimum value of 2500.

User response

Specify a record length of 2500 or greater.

0335301A No private key.

Explanation

The key entry does not contain a private key or the private key is not usable. This error might also occur if:
  • The private key is stored in ICSF, and ICSF services are not available.
  • If the private key size is greater than the supported configuration limit or the application is executing in FIPS mode.
  • This error can occur when using a SAF key ring if:
    • The key ring is owned by another user.
    • Using a private key that is associated with a user certificate in a SAF key ring that is owned by another user, and if the user ID of the application does not have appropriate access to the ringOwner.ringName.LST resource in the RDATALIB class.
    • Certificates meant to represent a server or client must be connected to a SAF key ring with a USAGE value of PERSONAL, and either owned by the user ID of the application or SITE certificates.
  • This error can occur when using z/OS PKCS #11 tokens if:
    • The user ID of the application does not have appropriate access to the CRYPTOZ class.
    • The label name is not valid for a certificate's PKCS #11 TKDS secure key.
    • The PKCS #11 key object does not exist.
    • The certificate's PKCS #11 TKDS secure key algorithm is not supported.
    • Using gsk_make_enveloped_private_key_msg() and the PKCS #11 secure key object that is used as input exists in the PKDS instead of the TKDS.

User response

Verify that the ICSF started task is running if the private key is stored in ICSF. Otherwise, repeat the failing request by using a database entry containing a private key. If using z/OS PKCS #11 tokens, ensure that the user ID has appropriate access to the CRYPTOZ class.

If executing in FIPS mode, ensure that the certificate that is being used does not have its private key stored in ICSF.

If using PKCS # 11 tokens:
  • Verify that the certificate's PKCS #11 secure key label name is valid within the TKDS.
  • Verify that the PKCS #11 TKDS secure key algorithm is supported.
  • If you are using gsk_make_enveloped_private_key_msg(), verify that the input PKCS #11 key object exists in the TKDS.

0335301B Record label is not valid.

Explanation

The record label is not valid. A label may contain letters, numbers, and punctuation. A record label may not be an empty string.

User response

Provide a valid record label.

0335301C Record label is not unique.

Explanation

A record label must be unique within a key database file and its associated request database.

User response

Verify the labels already in use by a key database file and its associated request database and provide a unique record label.

0335301D Record type is not valid.

Explanation

The database record type is not valid.

User response

Provide a valid database record type.

0335301E Duplicate certificate.

Explanation

An attempt is made to add a certificate to a key database but the database already contains the certificate. A certificate is a duplicate if the issuer name and certificate serial number are the same.

User response

Delete the existing certificate before adding the new certificate.

0335301F Incorrect Base64 encoding.

Explanation

An encoded stream cannot be decoded because it contains an incorrect Base64 encoding. A Base64 encoding consists of a header line (for example, -----BEGIN CERTIFICATE-----), encoded text, and a footer line (for example, -----END CERTIFICATE-----). The encoded text is encoded using a 64-character subset in groups of 4 characters.

User response

Ensure that the encoded stream has not been truncated or modified. Base64 encoding uses text data and must be in the local code page. Contact your service representative if the error persists.

03353020 Unrecognized file or message encoding.

Explanation

A file or message cannot be imported because the format is not recognized.

System SSL supports X.509 DER-encoded certificates, PKCS #7 signed data messages, and PKCS #12 personal information exchange messages for certificate import files. The import file data may be the binary data or the Base64-encoding of the binary data.

System SSL supports PKCS #7 data, encrypted data, signed data, and enveloped data for messages. This error can also occur if the message is not constructed properly.

User response

Ensure that the import file or message has not been modified. A Base64-encoded import file must be converted to the local code page when it is moved to another system while a binary import file must not be modified when it is moved to another system.

If importing a certificate from a Base64 file, the first and last lines contain readable data. The first line in the file contains '-----BEGIN CERTIFICATE-----' and the last line in the file contains '----END CERTIFICATE-----'. If data is not correct, ensure that the file was transferred successfully.

03353021 Certificate is not yet valid.

Explanation

The current time is earlier than the beginning of the certificate validity.

User response

Either wait until the certificate is valid or request a new certificate with an earlier starting date from the certification authority.

03353022 Certificate is expired

Explanation

The current time is after the end of the certificate validity.

User response

Request a new certificate from the certification authority.

03353023 Name format is not supported.

Explanation

An unsupported name format is encountered while validating a certificate.

User response

Contact your service representative.

03353024 Issuer certificate not found.

Explanation

An issuer certificate is not found while validating a certificate. This error can occur if the issuer certificate required for a new certificate is not in the key database or if the required issuer certificate is not trusted or has expired.

User response

Ensure that the key database contains the required issuer certificate and that the certificate is marked as trusted. See Database menu for information about displaying the contents of an external certificate file to verify which issuer certificate is required. Contact your service representative if the error persists.

Start of changeIf using RACF key rings, certificates that are marked as not trusted in the RACF database are not retrieved from the key ring. Ensure that the certificates needed to build the certificate’s trust chain are available.End of change

Start of changeIf using RACF key rings and the DIGTCERT and DIGTRING classes are RACLIST'ed, issue the SETROPTS RACLIST (DIGTCERT, DIGTRING) REFRESH command to refresh the profiles to ensure that the latest changes are available.End of change

Start of changeIf generic profiling checking was enabled for the DIGTCERT class when the certificate was created or added and its issuer's distinguished name contains any generic characters (*, & and %), a generic certificate profile was created. This generic profile processing may cause the certificate not to be read from the key ring. This certificate will need to be removed and added back after turning off generic profile checking for DIGTCERT class. The SEARCH CLASS(DIGTCERT) command can be used to determine if the certificate’s profile is generic. A (G) indicates generic.End of change

03353025 Certification path is too long.

Explanation

The certification path length exceeds the maximum that is specified in the certification authority certificate.

User response

Report the problem to the certification authority.

03353026 Incorrect key usage.

Explanation

The key usage certificate extension does not permit the requested key operation.

User response

Obtain a certificate, which allows the requested key operation.

03353027 Issuer is not a certification authority.

Explanation

The issuer of an X.509 certificate or the certificate used to sign a certificate revocation list is not a certification authority. This indicates that the basic constraints certificate extension in the issuer certificate or the certificate used to sign a certificate revocation list does not contain the certification authority indicator.

User response

Report the problem to the issuer of the certificate. If creating a signed certificate revocation list, ensure that a valid certificate authority is specified in the gsk_construct_signed_crl(), gsk_create_signed_crl(), or gsk_create_signed_crl_record() routines.

03353028 Export file format is not supported.

Explanation

The requested export file format is not supported for the specified database record. Certificates can be exported using the DER and PKCS #7 formats. Certificates and keys can be exported using the PKCS #12 formats.

User response

Select an appropriate export file format.

03353029 Cryptographic algorithm is not available.

Explanation

An X.509 cryptographic algorithm is not available. Because of government export regulations, strong encryption is not available on the local system.

User response

Select an algorithm that is available.

0335302A Record type cannot be changed.

Explanation

The record type cannot be changed when replacing a database record.

User response

Create a new database entry for the record.

0335302B Subject name cannot be changed.

Explanation

The subject name cannot be changed when replacing a database record where the database record has no private key or is used as a signing certificate for other user or server certificates.

User response

Create a new database entry for the record.

0335302C Public key cannot be changed.

Explanation

The subject public key cannot be changed when replacing a database record.

User response

Create a new database entry for the record.

0335302D Default key cannot be changed

Explanation

The default key for the database cannot be changed using the gsk_replace_record()routine.

User response

Use the gsk_set_default_key() routine to change the default key for the database.

0335302E Database contains certificates signed by the certificate.

Explanation

A CA certificate cannot be deleted because the database still contains certificates that were signed using that certificate. A certificate renewal for a signing certificate fails with this error code if the certificates subject name has changed.

User response

Delete all certificates that are signed by the CA certificate before deleting the certificate. To renew a signing certificate with a changed subject name all dependent certificates must be resigned with the new certificate:
  • Create certificate renewal requests for each dependent certificate and delete the dependent certificates and keys.
  • Receive the new signing certificate.
  • Sign any dependent certificate requests with the new signing certificate.
  • Receive the signed dependent certificate renewals.

0335302F Certificate chain is not trusted.

Explanation

A certification authority (CA) certificate in the certification chain is not trusted.

User response

Set the trust status for the CA certificate if the certificate can be used for authentication purposes.

Start of changeIf using RACF key rings, certificates that are marked as not trusted in the RACF database are not retrieved from the key ring. Ensure that the certificates needed to build the certificate's trust chain are available and have not expired.End of change

Start of changeIf using RACF key rings and the DIGTCERT and DIGTRING classes are RACLIST'ed, issue the SETROPTS RACLIST (DIGTCERT, DIGTRING) REFRESH command to refresh the profiles to ensure that the latest changes are available.End of change

Start of changeIf generic profiling checking was enabled for the DIGTCERT class when the certificate was created or added and its issuer's distinguished name contains any generic characters (*, & and %), a generic certificate profile was created. This generic profile processing may cause the certificate not to be read from the key ring. This certificate will need to be removed and added back after turning off generic profile checking for DIGTCERT class. The SEARCH CLASS(DIGTCERT) command can be used to determine if the certificate’s profile is generic. A (G) indicates generic.End of change

03353030 Key not supported by encryption or signature algorithm.

Explanation

The supplied key is not supported by the requested encryption or signature algorithm.

User response

Provide the appropriate key for the encryption or signature algorithm. For example, an RSA key cannot be used to verify that a DSA signature and a DSA key cannot be used to encrypt data. RSASSA-PSS signatures require an RSA key to perform the operation successfully.

03353031 Signer certificate not found.

Explanation

A signer certificate is not found while creating or processing a signed message,

User response

Provide a certificate for each signer, including signers of authenticated attributes.

03353032 Content type is not supported.

Explanation

An unsupported PKCS #7 content type is encountered.

User response

See the Programming Reference for the failing routine to determine the supported content types.

03353033 Recipient certificate not found.

Explanation

A recipient certificate is not found while creating or processing an enveloped message.

User response

Provide at least one recipient certificate.

03353034 Encryption key size is not supported.

Explanation

The encryption key size is not supported by the System SSL run time.

User response

See the System SSL information to determine which key sizes are supported. In general, when executing in non-FIPS mode, 40-bit keys and 128-bit keys are supported for RC2 and RC4, 56-bit keys are supported for DES, 168-bit keys are supported for Triple DES, and 128-bit keys and 256-bit keys are supported for AES. RSA keys must be between 512 and 4096 bits, DSS keys must be between 512 and 2048 bits, and Diffie-Hellman keys must be between 512 and 2048 bits.

When executing in FIPS mode with GSK_FIPS_STATE_ON or GSK_FIPS_STATE_LEVEL1 set, 168-bit keys are supported for Triple DES, and 128-bit keys and 256-bit keys are supported for AES. RSA keys must be between 1024 and 4096 bits, DSS keys must be between 1024 and 2048 bits, and Diffie-Hellman keys must be 2048 bits.

When executing in FIPS mode with GSK_FIPS_STATE_LEVEL2 set, 112-bit security is enforced when creating new keys or performing digital signature generation and encryption type operations. Digital signature verification, decryption using Triple DES and RSA decryption with 80-bit key lengths is allowed when processing already protected information. For key generation, DSS keys must be between 1024 and 2048 bits, Diffie-Hellman keys must be 2048 bits, ECC keys must 192 or greater, and RSA keys must be between 2048 and 4096 bits. For verification, DSS keys must be 1024 or 2048 bits, ECC keys must 192 or greater, and RSA keys must be between 1024 and 4096 bits.

When executing in FIPS mode with GSK_FIPS_STATE_LEVEL3 set, 112 bit or higher security strength is enforced as defined in NIST SP800-131Ar1. For key generation, DSS keys must be 2048 bits, Diffie-Hellman keys must be 2048 bits, ECC keys must 224 or greater, and RSA keys must be between 2048 and 4096 bits. For verification, DSS keys must be 2048 bits, ECC keys must 224 or greater, and RSA keys must be between 2048 and 4096 bits.

When using RSASSA-PSS signature algorithm to perform sign or verify operations, only RSA key sizes 2048 through 4096 inclusive are supported.

This error can also occur if the requested key size is not compatible with the supplied key generation parameters. See the System SSL information to determine which key sizes are supported. See System SSL and FIPS 140-2 for information about operating in FIPS mode.

03353035 Encryption key parity is not correct.

Explanation

DES and Triple DES encryption keys must have odd parity for each key byte.

User response

Verify that the key is generated correctly. Contact your service representative if the error persists.

03353036 Encryption key is weak.

Explanation

A small subset of the possible DES and Triple DES encryption keys are weak and can be broken more easily than the rest of the keys. For this reason, the weak keys should be avoided when generating a DES or Triple DES key. The error can also occur while running in FIPS mode with a user supplied Triple DES session key when the key does not contain three unique key parts.

User response

A user supplied Triple DES key was found to be weak or a Triple DES key was specified that did not have three unique key parts. Ensure the key being used is valid and retry the operation. If the problem persists, collect a System SSL trace containing the error and then contact your service representative.

03353037 Initial vector size is not correct.

Explanation

The initial vector that is used by the encryption routine is not the correct length.

User response

Contact your service representative.

03353038 Encryption data size is not correct.

Explanation

The length of the encryption data is not correct. For symmetric key algorithms using cipher block chaining, the encryption data must be a multiple of the cipher block size. For asymmetric key algorithms, the encryption data must be the same length as the cipher key modulus.

User response

Verify that the encryption data has not been truncated. Contact your service representative if the error persists.

03353039 Encryption block format is not correct.

Explanation

The encryption block format is not correct following decryption. This error can occur if the wrong key is used to decrypt the block.

User response

Verify that the correct key is being used to decrypt the data. Contact your service representative if the error persists.

0335303A Number does not have a modular inverse.

Explanation

The cryptographic support is unable to find an inverse for a number.

User response

Contact your support representative.

0335303B LDAP processing error.

Explanation

An error is detected while setting up the LDAP environment or retrieving an LDAP directory entry.

User response

Ensure that the LDAP server is running and that there are no network errors. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

0335303C LDAP is not available.

Explanation

The System SSL run time is unable to access the LDAP server.

User response

Ensure that the LDAP server is running and that there are no network problems. Collect a System SSL trace and then contact your service representative if the error persists.

0335303D Digest data size is not correct.

Explanation

The length of the digest data is not correct. Digest data size by algorithm is:
  • MD2 – 16 bytes
  • MD5 – 16 bytes
  • SHA-1 – 20 bytes
  • SHA-224 – 28 bytes
  • SHA-256 – 32 bytes
  • SHA-384 – 48 bytes
  • SHA-512 – 64 bytes

User response

Verify that the data has not been truncated. Contact your service representative if the error persists.

0335303E Database name is not valid.

Explanation

The database file name or SAF key ring name is not valid. The length of the fully-qualified database file name must be between 1 and 251 while the length of the SAF key ring must be between 1 and 237.

User response

Provide a valid database name.

0335303F Database open failed.

Explanation

The System SSL run time is unable to open the database file, SAF key ring or z/OS PKCS #11 token.

User response

Verify that the database file, SAF key ring, or z/OS PKCS #11 token exists and is accessible by the application. Collect a System SSL trace and then contact your service representative if the error persists.

03353040 Self-signed certificate not in database.

Explanation

A self-signed certificate cannot be validated because it is not in the key database, SAF key ring or z/OS PKCS #11 token.

User response

Add the self-signed certificate to the key database, SAF key ring or z/OS PKCS #11 token.

This code may also occur if the intermediate certificate on the key ring was not marked Trusted.

Start of changeIf using RACF key rings, certificates that are marked as not trusted in the RACF database are not retrieved from the key ring. Ensure that the certificates needed to build the certificate’s trust chain are available.End of change

If using RACF key rings and the DIGTCERT and DIGTRING classes are RACLIST'ed, issue the SETROPTS RACLIST (DIGTCERT, DIGTRING) REFRESH command to refresh the profiles to ensure that the latest changes are available.

Start of changeIf generic profiling checking was enabled for the DIGTCERT class when the certificate was created or added and its issuer's distinguished name contains any generic characters (*, & and %), a generic certificate profile was created. This generic profile processing may cause the certificate not to be read from the key ring. This certificate will need to be removed and added back after turning off generic profile checking for DIGTCERT class. The SEARCH CLASS(DIGTCERT) command can be used to determine if the certificate’s profile is generic. A (G) indicates generic.End of change

03353041 Certificate is revoked.

Explanation

A certificate is revoked and cannot be used.

User response

Obtain a new certificate from the certification authority.

03353042 Issuer name is not valid.

Explanation

The certificate issuer name must be a non-empty X.509 distinguished name.

User response

Obtain a new certificate with a valid issuer name.

03353043 Subject name is not valid.

Explanation

The certificate subject name must be either a non-empty distinguished name or an empty distinguished name with a SubjectAltName certificate extension.

User response

Obtain a new certificate with a valid subject name.

03353044 Name constraints violated.

Explanation

The certificate name is not allowed by the certification path name constraints.

User response

Report the problem to the certification authority.

03353045 No content data.

Explanation

The PKCS #7 content information does not contain any content data.

User response

Change the application to provide content data for the content information.

03353046 Version is not supported.

Explanation

An unsupported version is encountered.

User response

See the Programming Reference for the failing routine to determine the supported versions.

03353047 Subject name is same as signer name.

Explanation

A request to create a new certificate cannot be processed because the requested subject name is the same as the subject name of the signing certificate.

User response

Choose a different subject name for the new certificate.

03353048 Diffie-Hellman group parameters are not valid.

Explanation

The Diffie-Hellman group parameters are not valid. The subprime Q must be greater than 1 and less than the prime P. The base G must be greater than 1 and less than the prime P. See RFC 2631 for more information about how the Diffie-Hellman parameters are generated.

User response

Verify that the correct parameters are supplied when calling the failing routine. Contact the certification authority if the Diffie-Hellman group parameters are obtained from an X.509 certificate. Otherwise, collect a System SSL trace and then contact your service representative.

03353049 Diffie-Hellman values are not valid.

Explanation

The Diffie-Hellman values are not valid. The private value X must be greater than 1 and less than the prime P. The public value Y must be greater than 1 and less than the prime P. In addition, the result of raising the public value Y to the power of the subprime Q modulo the prime P must be equal to 1. See RFC 2631 for more information about how the Diffie-Hellman values are generated.

User response

Contact the certification authority if the Diffie-Hellman values are obtained from an X.509 certificate. Otherwise, collect a System SSL trace and then contact your service representative.

0335304A Digital Signature Standard parameters are not valid.

Explanation

The Digital Signature Standard parameters are not valid. The subprime Q must be greater than 1 and less than the prime P. The base G must be greater than 1 and less than the prime P. See FIPS 186-2: Digital Signature Standard (DSS) for more information about how the parameters are generated.

User response

Verify that the correct parameters are supplied when calling the failing routine. Contact the certification authority if the DSS parameters are obtained from an X.509 certificate. Otherwise, collect a System SSL trace and then contact your service representative.

0335304B Certificate not valid for host.

Explanation

A server certificate does not contain the current host name as either the common name (CN) element of the subject name or as a DNS entry for the subject alternate name.

User response

Obtain a new certificate containing the host name you want.

0335304C No certificate in import file.

Explanation

The import file does not contain an X.509 certificate.

User response

Specify a valid certificate import file.

0335304D The content-type authenticated attribute is not allowed.

Explanation

The set of authenticated attributes that are supplied within the attributes_signers parameter must NOT include the content-type authenticated attribute as this is automatically provided by gsk_make_signed_data_content_extended() and gsk_make_signed_data_msg_extended().

User response

Do not include content-type or message-digest in the set of authenticated attributes that are supplied to gsk_make_signed_data_content_extended() or gsk_make_signed_data_msg_extended().

0335304E The message-digest authenticated attribute is not allowed.

Explanation

The set of authenticated attributes that are supplied from the attributes_signers parameter must NOT include the message-digest authenticated attribute as this is automatically provided by gsk_make_signed_data_content_extended() and gsk_make_signed_data_msg_extended().

User response

Do not include content-type or message-digest in the set of authenticated attributes that are supplied to gsk_make_signed_data_content_extended() or gsk_make_signed_data_msg_extended().

0335304F Attribute identifier is not valid.

Explanation

The attribute identifier is not valid.

User response

Specify a valid attribute identifier.

03353050 Enumeration is not valid.

Explanation

The enumeration value is not valid.

User response

Specify a valid enumeration value.

03353051 CA certificate not supplied

Explanation

A signing CA certificate was not supplied on the call.

User response

Supply a CA certificate on the function call.

03353052 Validation option is not valid.

Explanation

The specified validation option is not valid.

User response

Specify a valid validation option.

03353053 Certificate request not supplied.

Explanation

A certificate request structure was not supplied on the call.

User response

Supply a certificate request structure on the function call.

03353054 Public key info not supplied.

Explanation

A pkcs_public_key_info structure was not supplied on the call.

User response

Supply a pkcs_public_key_info structure on the function call.

03353055 Modulus bits not supplied.

Explanation

The number of modulus bits was not supplied on the call.

User response

Supply the number of modulus bits on the function call.

03353056 Exponent not supplied.

Explanation

A gsk_buffer structure containing the exponent was not supplied on the call.

User response

Supply a gsk_buffer structure containing the exponent on the function call.

03353057 Private key info not supplied.

Explanation

A pkcs_private_key_info structure was not supplied on the call.

User response

Supply a pkcs_private_key_info on the function call.

03353058 Modulus not supplied.

Explanation

A gsk_buffer structure containing the modulus for the RSA key was either not supplied on the call or not supplied in the gsk_private_key or gsk_public_key structure.

User response

Ensure that a gsk_buffer structure containing the modulus for the RSA key is supplied on the function call, or is defined in the gsk_private_key or gsk_public_key structure.

03353059 Public exponent not supplied.

Explanation

A gsk_buffer structure containing the public exponent for the RSA key was not supplied on the call or not supplied in the gsk_private_key or gsk_public_key structure.

User response

Ensure that a gsk_buffer structure containing the public exponent for the RSA key is supplied on the function call, or is defined in the gsk_private_key or gsk_public_key structure.

0335305A Private exponent not supplied.

Explanation

A gsk_buffer structure containing the private exponent for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the private exponent for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

0335305B First prime not supplied.

Explanation

A gsk_buffer structure containing the first prime for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the first prime exponent for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

0335305C Second prime not supplied.

Explanation

A gsk_buffer structure containing the second prime for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the second prime for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

0335305D First prime exponent not supplied.

Explanation

A gsk_buffer structure containing the first prime exponent for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the prime exponent for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

0335305E Second prime exponent not supplied.

Explanation

A gsk_buffer structure containing the second prime exponent for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the second prime exponent for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

0335305F CRT coefficient not supplied.

Explanation

A gsk_buffer structure containing the CRT coefficient for the RSA key was not supplied on the call, or not supplied in the gsk_private_key structure.

User response

Ensure that a gsk_buffer structure containing the CRT coefficient for the RSA key is supplied on the function call, or is defined in the gsk_private_key structure.

03353060 Certificate revocation list cannot be found.

Explanation

The required certificate revocation list (CRL) cannot be found in the specified LDAP server when the gsk_crl_security_level is set to HIGH or the CRL cannot be found in the HTTP server indicated in the CRL distribution points extension and the gskcms_revocation_security_level is set to MEDIUM or HIGH.

User response

If contacting an LDAP server to retrieve the CRL, verify that the CRL is present in the LDAP entry being searched and is valid. Verify that the certificate's issuer is the same as the CRL issuer. Contact the certification authority and obtain the required CRL.

If contacting an HTTP server to retrieve the CRL, verify that the CRL is present on the HTTP server. Contact the HTTP server administrator to verify that the CRL is present on the server. If there are crlIssuers present in the CRL distribution point extension, verify that there is at least one match between those and the CRL issuer. If a match cannot be found in the crlIssuers in the CRL distribution point extension or there are no crlIssuers present, verify that the certificate's issuer is the same as the CRL issuer. The HTTP server administrator may need to contact the certification authority to obtain the required CRL.

Collect a System SSL trace containing the error and then contact your service representative if the problem persists.

03353061 Multiple certificates exist for label.

Explanation

Access of certificate/key from label could not be resolved because multiple certificates/keys exist with the label.

User response

Correct certificate/key store so that label specifies a unique record.

03353062 Multiple keys are marked as the default.

Explanation

Access of key from default status could not be resolved because multiple keys are marked as the default key.

User response

Correct the certificate/key store so that only one key is marked as the default key.

03353064 Digest type and key type are incompatible.

Explanation

The specified digest algorithm and the key algorithm are incompatible.

User response

Specify a digest algorithm that is compatible with the signing key algorithm.

03353065 Generate random bytes input buffer not valid.

Explanation

The input buffer to gsk_generate_random_bytes is not valid.

User response

Ensure a valid gsk_buffer structure has been supplied to the gsk_generate_random_bytes API. Contact your service representative if the error persists.

03353066 Generate random bytes produced duplicate output.

Explanation

The Random Number Generator produced identical consecutive blocks of output data. If in FIPS mode, any further attempts to use System SSL continues to fail until the application is restarted or the executing process is reinitialized.

User response

Restart the SSL application or process to reinitialize the SSL DLLs. If the problem persists, collect a System SSL trace containing the error and contact your service representative.

03353067 Known Answer Test has failed.

Explanation

A Known Answer Test failed to match the expected results. Any further attempts to use System SSL continues to fail until the application is restarted or the executing process is reinitialized.

User response

Restart the SSL application or process to reinitialize the SSL DLLs. If the problem persists, collect a System SSL trace containing the error and contact your service representative.

03353068 API is not supported.

Explanation

The API is not supported. An attempt was made to use an API that is not supported in the current mode of operation (FIPS or non-FIPS).

User response

Ensure that the API being used is supported in the mode in which the application is executing. If you are invoking a FIPSonly API, you must restart your application in FIPS mode.

03353069 Key database is not a FIPS mode database.

Explanation

While executing in FIPS mode, an attempt was made to open a key database that is non-FIPS.

User response

Specify a key database that meets FIPS 140-2 criteria, if running in FIPS mode.

0335306A Key database can only be opened for update if running in FIPS mode.

Explanation

While executing in non-FIPS mode, an attempt was made to open a FIPS key database for update.

User response

To open a FIPS key database for update, you must be executing in FIPS mode.

0335306B Cannot switch from non-FIPS mode to FIPS mode.

Explanation

While executing in non-FIPS mode, an attempt was made to switch to FIPS mode.

User response

Once executing in non-FIPS mode it is not possible to switch to FIPS mode.

0335306C Attempt to execute in FIPS mode failed.

Explanation

A request to execute in FIPS mode failed because the required System SSL DLLs could not be loaded.

User response

Ensure that the Cryptographic Services Security Level 3 FMID is installed and that module verification has been setup correctly. See System SSL module verification setup for module verification information. Module verification failures may also result in RACF messages (for example, ICH440I) being written to the console with information about the failure. If the module verification problem persists, collect a System SSL trace containing the error and then contact your service representative.

0335306D Acceptable policy intersection cannot be found.

Explanation

The Certificate Policies extension of the certificate does not contain an acceptable policy as required by the application or an issuing certificate.

User response

Ensure that the certificate chain is valid and the user certificate is intended to be used for the required purpose.

0335306E Variable argument count is not valid.

Explanation

The specified variable argument count is not valid.

User response

Specify a valid variable argument count.

0335306F Required certificate extension is missing.

Explanation

A certificate extension that is mandatory for the certificate to be used for the required purpose has not been found.

User response

Ensure that the certificate chain is correct and complies with the validation mode defined for the connection. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

If performing a PKCS #7 operation to encode a signer identifier, ensure that the certificate has a subject key identifier extension.

03353070 Certificate extension data is incorrect.

Explanation

A certificate extension has incorrect data or has a necessary field missing.

User response

Ensure that the certificate chain is correct and complies with the validation mode defined for the connection. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353071 Certificate extension data has an incorrect critical indicator.

Explanation

A critical indicator for a certificate extension is incorrect. Either the extension is required to be marked critical and is marked non-critical or is required to be marked non-critical and is marked critical.

User response

Ensure that the certificate chain is correct and complies with the validation mode defined for the connection. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353072 Certificate contains a duplicate extension.

Explanation

The certificate or CRL undergoing validation contains multiple certificates or CRL extensions of the same type.

User response

Ensure that the certificate chain is correct and complies with the validation mode defined for the connection. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353073 Cannot match CRL distribution points.

Explanation

The DN in the Issuing Distribution Point extension of the CRL does not match a suitable DN in the certificate undergoing validation. The DN in the Issuing Distribution Point extension must match either:
  • A DN of type fullName in the Distribution Point of the CRL Distribution Points extension of the certificate undergoing validation
  • The CRLIssuer field in the Distribution Point of the CRL Distribution Points extension of the certificate undergoing validation
  • The Certificate Issuer name, if no CRL Distribution Point extension exists in the certificate undergoing validation

User response

Ensure that the certificate chain is correct and complies with the validation mode defined for the connection. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353074 FIPS mode key generation failed pair-wise consistency check.

Explanation

While executing in FIPS mode, a key pair was generated that failed a pair-wise consistency check. Any further attempts to use System SSL continues to fail until the application is restarted or the executing process is reinitialized.

User response

Restart the SSL application or process to reinitialize the SSL DLLs. If the problem persists, collect a System SSL trace containing the error and then contact your service representative.

03353076 Prime not supplied.

Explanation

A gsk_buffer structure containing the prime for the DSA or Diffie-Hellman key was not supplied in the gsk_private_key or gsk_public_key structure.

User response

Ensure that the prime value for the DSA or Diffie-Hellman key is defined in the gsk_private_key or gsk_public_key structure.

03353077 Subprime not supplied.

Explanation

A gsk_buffer structure containing the sub_prime for the DSA key was not supplied in the gsk_private_key or gsk_public_key structure.

User response

Ensure that the sub prime value for the DSA key is defined in the gsk_private_key or gsk_public_key structure.

03353078 Base not supplied.

Explanation

A gsk_buffer structure containing the base for the DSA or Diffie-Hellman key was not supplied in the gsk_private_key or gsk_public_key structure.

User response

Ensure that the base value for the DSA or Diffie-Hellman key is defined in the gsk_private_key or gsk_public_key structure.

03353079 Private value not supplied.

Explanation

A gsk_buffer structure containing the private value for the DSA or Diffie-Hellman key was not supplied in the gsk_private_key structure.

User response

Ensure that the private value for the DSA or Diffie-Hellman key is defined in the gsk_private_key structure.

0335307A Public value not supplied.

Explanation

A gsk_buffer structure containing the public value for the DSA or Diffie-Hellman key was not supplied in the gsk_public_key structure.

User response

Ensure that the public value for the DSA or Diffie-Hellman key is defined in the gsk_public_key structure.

0335307B Private key structure not supplied.

Explanation

The structure containing the private key components was not supplied on the call.

User response

Supply the structure containing the private key components on the function call.

0335307C Public key structure not supplied.

Explanation

The structure containing the public key components was not supplied on the call.

User response

Supply the structure containing the public key components on the function call.

0335307D Size specified for supplied structure is too small.

Explanation

The value of the size field in the structure indicates that the size of the structure is insufficient.

User response

Ensure that the size field in the structure being used is initialized to the size of structure.

0335307E Elliptic Curve is not supported.

Explanation

The elliptic curve domain parameters that are defined for the elliptic curve public or private key are not supported.

User response

Ensure the elliptic curve public/private key pair uses a supported elliptic curve. See Using cryptographic features with System SSL for the list of elliptic curves that are supported by System SSL.

0335307F EC Parameters not supplied.

Explanation

A gsk_buffer structure containing the EC domain parameters was not supplied on the call.

User response

Supply a gsk_buffer structure containing the EC domain parameters on the function call.

03353080 Signature not supplied.

Explanation

A gsk_buffer structure containing the signature was not supplied on the call.

User response

Supply a gsk_buffer structure containing the signature on the function call.

03353081 Elliptic Curve parameters are not valid.

Explanation

The EC domain parameters that are defined for the elliptic curve public or private key are not valid. Either no parameters could be found or the parameters could not be successfully decoded.

User response

Ensure the elliptic curve public/private key pair uses a valid elliptic curve.

03353082 Elliptic Curve not supported in FIPS mode.

Explanation

The EC domain parameters that are defined for the elliptic curve public or private key are not approved in FIPS mode.

User response

Ensure the elliptic curve for the public or private key is valid in FIPS mode. See System SSL and FIPS 140-2 for a list of elliptic curves that are supported by System SSL when running in FIPS mode.

03353083 ICSF services are unavailable.

Explanation

A cryptographic process cannot be completed because of ICSF callable services being unavailable.

User response

Ensure that ICSF is running and operating correctly.

03353084 ICSF callable service returned an error.

Explanation

Ensure that ICSF is operating correctly and if access to the ICSF callable services are protected with CSFSERV class profiles that the user ID of the application has READ access to the profiles protecting the ICSF callable services. See Table 1or Table 2 for information about the required resource profile access. If the problem persists, collect a System SSL trace and contact your service representative.

User response

Ensure that ICSF is operating correctly and that the user ID of the application has appropriate access to the CSFSERV class RACF resource profiles. See Table 1 or Table 2 for information about required resource profile access. Collect a System SSL trace and verify the ICSF return code and reason code relating to the error. See z/OS Cryptographic Services ICSF Application Programmer's Guide for more information about ICSF return and reason codes. If the problem persists contact your service representative.

03353085 ICSF PKCS #11 not operating in FIPS mode.

Explanation

While running in FIPS mode, an attempt was made to use ICSF PKCS #11 services, which were not operating in FIPS mode.

User response

Ensure that ICSF is configured to run in FIPS mode.

03353086 Incorrect key algorithm.

Explanation

A supplied key uses an algorithm type that is not suitable for the requested function. This error can occur if a non-ECC key has been supplied to an ECC related function, or if incompatible keys are supplied for certificate creation, such as a certificate containing a Diffie-Hellman key to be signed with an ECDSA key.

User response

Ensure the key supplied uses a suitable key algorithm type. Collect a System SSL trace containing the error to verify the key algorithms. Contact your service representative if the error persists.

03353087 Certificate revocation list is expired.

Explanation

The current time is after the nextUpdate time specified in the CRL.

User response

Obtain the latest copy of the CRL from the certification authority.

03353088 Cryptographic hardware does not support service or algorithm.

Explanation

A call requiring cryptographic hardware was made to ICSF. The current installation hardware does not support the service or algorithm being used. The cryptographic hardware may not have the required level of support to perform an RSASSA-PSS signing. For more information about the cryptographic hardware support for RSASSA-PSS, see RSASSA-PSS signature support.

User response

Ensure that the correct protocol is in use for your installation or that cryptographic hardware that is required for this service or algorithm is available to ICSF.

03353089 ICSF PKCS #11 services are disabled.

Explanation

An attempt was made to use ICSF PKCS #11 services, which are disabled because of an ICSF FIPS self-test failure.

User response

Stop and restart ICSF. System SSL may need restarting to regain the full hardware benefit from ICSF. Contact your service representative if the error persists.

0335308A Known Answer Test has failed when attempting to use ICSF.

Explanation

A Known Answer Test failed because of ICSF returning an error. Any further attempts to use System SSL continues to fail until the application is restarted or the executing process is reinitialized.

User response

Ensure that ICSF is running and operating correctly and that the user ID of the application has appropriate access to the CSFSERV class RACF resource profiles. See Table 1 for information about required resource profile access. Collect a System SSL trace and verify the ICSF return code and reason code relating to the error. See z/OS Cryptographic Services ICSF Application Programmer's Guide for more information about ICSF return and reason codes. If the problem persists contact your service representative.

0335308B Variable argument validate root is not valid.

Explanation

The specified variable argument validate root is not valid.

User response

Specify a valid variable argument validate root.

0335308C PKCS #11 label name not valid.

Explanation

The PKCS #11 secure key label name is not valid. This might be because the label is NULL, an empty string, or has only an equal sign (=).

User response

Verify that input label is correct.

0335308D Incorrect key attribute.

Explanation

One or more PKCS #11 attributes or parameters for a key are missing or incorrect for a requested function that is being performed. For example, a signing operation requires that for the key that is being used, the PKCS #11 sign attribute is to be TRUE. Verify that the correct key is being used for the requested function, and that all required attributes are set for that key. If using gsk_make_enveloped_private_key_msg(), ensure that a recipient certificate's RSA public key is valid.

User response

Verify that a certificate's PKCS #11 key attributes are correct for the function that is being performed.

0335308E PKCS #11 object was not found.

Explanation

PKCS #11 token, token object, or session object are not found.

User response

Verify that a PKCS #11 token or token object is in the TKDS data set. Also, verify that the session object is not lost because of ICSF restarting after the object is created.

0335308F An algorithm or key size is not FIPS approved for an ICSF operation.

Explanation

ICSF is in FIPS mode. A call to ICSF for cryptographic or signing support failed because the input key algorithm or size is not supported in FIPS mode. For example, an RSA key size of 512 is not supported in FIPS mode.

User response

Verify that the certificate key that is being used is a supported algorithm and size when ICSF is in FIPS mode. See Algorithm support: FIPS and non-FIPS for more information about supported algorithms and key sizes.

03353090 PKCS #11 key cannot be extracted.

Explanation

An attempt to export a PKCS #11 secure key failed because PKCS #11 attribute CKA_EXTRACTABLE is set to CK_FALSE.

User response

Verify that input label is correct. If it is correct, then the key cannot be exported.

03353093 Clear key support not available due to ICSF key policy.

Explanation

Unable to generate clear keys or PKCS #11 objects because of the caller's RACF access to CRYPTOZ class resource CLEARKEY.SYSTOK-SESSION-ONLY or CLEARKEY.token_name not permitting the generation of non-secure (clear) PKCS #11 keys.

User response

Ensure that the user ID of the application has appropriate access to the RACF CRYPTOZ class resource CLEARKEY.SYSTOK-SESSION-ONLY. If using gskkyman, ensure issuer also has access to resource CLEARKEY.token_name. token_name is the name of the PKCS #11 token that is being managed by gskkyman.

03353094 OCSP responder requires a signed request

Explanation

The OCSP responder contacted for certificate validation requires that all OCSP requests be signed.

User response

Enable OCSP request signing by specifying a valid database handle (ocspDbHandle), label of signing certificate (ocspReqlabel), and the signature algorithm (ocspReqSignatureAlgorithm) within the OCSP data source structure.

03353095 HTTP response is not valid

Explanation

The HTTP response received was not properly formatted or contents are not valid. The HTTP response received must be an HTTP/1.0 or HTTP/1.1 response.

User response

Ensure that the HTTP server is running, that there are no network errors, and the HTTP server sends its responses using HTTP/1.0 or HTTP/1.1 protocols. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353096 OCSP response is not valid

Explanation

The OCSP ASN.1 encoded response received from the OCSP responder was not properly formatted or its contents are not valid.

User response

Ensure that the OCSP responder server is properly encoding the OCSP response, that it is running, and that there are no network errors. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353097 OCSP request failed with internal responder error

Explanation

The OCSP responder contacted for certificate validation returned an internal error.

User response

Ensure that the OCSP responder server is running and that there are no network errors. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353098 OCSP response is expired

Explanation

The current time is after the OCSP response expiration time.

User response

If using the dedicated OCSP responder, ensure that the OCSP responder server is using the most recent revocation information available from the certification authority. If certificate revocation through the AIA extension is enabled, ensure that the OCSP responder servers referenced in the certificate chain are using the most recent revocation information available. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

03353099 Numeric value is not valid

Explanation

A numeric value specified as either a parameter to or as a field within the data structure is not valid. If using the gsk_construct_signed_crl() routine, the this_update time must be less than the CRL expiration time.

User response

Verify that all numeric values specified contain numeric values that are within acceptable ranges. If using the gsk_construct_signed_crl() routine, specify a this_update time that is less than the CRL expiration time. The CRL expiration time is the earlier of the next_update time or the signing certificate's expiration time.

0335309A A PKCS #7 CMS Version is not supported

Explanation

The PKCS #7 CMS version is not supported.

User response

Verify that the PKCS #7 CMS version is supported by System SSL.

0335309B Input certificate not supplied

Explanation

The required input field, certificate, is missing.

User response

Verify that the input certificate is not NULL.

0335309C Error creating OCSP request

Explanation

An internal error was encountered while creating the OCSP request to send to an OCSP responder.

User response

If OCSP request signing is enabled, verify that the signing certificate resides in the handle returned from gsk_open_keyring() or gsk_open_database() and the signing certificate is valid (start time is before the current time and is not yet expired) and contains a private key. The handle is provided through the ocspDbHandle field within the gskdb_ocsp_source structure provided on the gsk_create_revocation_source() routine. The signing key label is provided through the ocspReqLabel field within the gskdb_ocsp_source structure provided on the gsk_create_revocation_source() routine.

Collect a System SSL trace containing the error and then contact your service representative if the error persists.

0335309D Maximum response size exceeded

Explanation

When attempting to retrieve revocation information, the HTTP response exceeded the maximum configured response size for either an OCSP response or a HTTP CRL. The response size is provided through either the ocspMaxResponseSize or httpCdpMaxResponseSize fields within the gskdb_ocsp_source or gskdb_cdp_source structures provided on the gsk_create_revocation_source() routine.

User response

Ensure that the HTTP response maximum size is adequate for the size of the CRLs or OCSP responses that are being retrieved. If necessary, increase the maximum response size until an adequate size is provided to handle the CRLs or OCSP responses that are being retrieved. If unable to determine an adequate size, collect a System SSL trace containing the error and then contact your service representative.

0335309E HTTP server communication error

Explanation

Unable to establish a connection to contact the HTTP server or the OCSP responder to retrieve certificate revocation information.

User response

If enabled for OCSP and a dedicated OCSP responder is enabled, ensure that the responder is running and can be accessed.

If enabled for OCSP responders identified in the certificate AIA extension, ensure that the OCSP responders specified in the extension are running and can be accessed.

If HTTP CRL support is enabled, ensure that the HTTP server specified in the CRL Distribution Point extension is running and can be accessed.

If there is a firewall in place and either an HTTP proxy server or port or an OCSP proxy server or port has been identified, ensure that the servers and ports settings are correct and the servers can be accessed. The proxy server and ports are specified through the gskdb_ocsp_source and gskdb_cdp_source structures provided on the call to the gsk_create_revocation_source() routine.

Collect a System SSL trace containing the error and then contact your service representative if the error persists.

0335309F Variable argument security level is not valid

Explanation

The specified variable argument security level is not valid.

User response

Specify a valid variable argument security level.

033530A0 Extended key usage input count is not valid

Explanation

The extended key usage input count must be at least 1.

User response

Verify that the extended key usage count is equal to the number of extended key usages provided. The count may not be less than 1.

033530A1 Extended key usage input is not supplied

Explanation

The extended key usage structure x509_key_usages is NULL or the x509_key_purpose structure within x509_key_usages is NULL.

User response

Verify that x509_key_usages is not NULL and that x509_key_purpose is not NULL within x509_key_usages.

033530A2 Extended key usage comparison failed

Explanation

The extended key usages comparison failed. The user-supplied validation parameter and extended key purpose list did not compare favorably to the certificate's extended key usage extension values.

User response

The extended key usage comparison failed. Verify that the desired validation option is correct for your use.

033530A3 Extended key usage type is not supported for this operation

Explanation

The extended key usage type should be a value defined within x509_purpose_type. Purpose types x509_purpose_unknown and x509_purpose_maximum are invalid. Use special case GSKCMS_VALIDATE_EXTENDED_KEY_USAGE_CHECK_OID only if OID comparison is required.

User response

Verify that the input x509_purpose_type is defined within the x509_purpose_type and is not x509_purpose_unknown, x509_purpose_maximum, or special case GSKCMS_VALIDATE_EXTENDED_KEY_USAGE_CHECK_OID.

033530A4 Certificate does not have an extended key usage extension

Explanation

The specified certificate does not have an extended key usage extension.

User response

Verify that the input x509_certificate has an extended key usage extension defined.

033530A5 Nonce in OCSP response does not match value in OCSP request

Explanation

When validating the nonce in the OCSP response, the value did not match the value sent in the OCSP request.

User response

If OCSP is enabled for the dedicated OCSP responder, ensure that the OCSP responder server is configured to send a nonce in OCSP responses.

Ensure that nonce checking is required. If not required, set ocspCheckNonce to FALSE within the gskdb_ocsp_source structure provided on the gsk_create_revocation_source() routine.

Collect a System SSL trace containing the error and then contact your service representative if the error persists.

033530A6 OCSP response not received within configured time limit

Explanation

The time limit indicated in the value for ocspResponseTimeout in the OCSP data source has been exceeded.

User response

Ensure that the HTTP server where the OCSP responder resides is available and able to process OCSP requests. Verify that the value for ocspResponseTimeout in the OCSP data source is sufficient to receive a complete response from the HTTP server containing the OCSP responder.

033530A7 Revocation information is not yet valid

Explanation

The current time is earlier than the validity period of the revocation information provided though either an OCSP response or CRL.

User response

Ensure that the system time is configured correctly. Collect a System SSL trace containing the error and then contact your service representative if the problem persists.

033530A8 HTTP server host name is not valid

Explanation

The URI value in the AIA extension or the CDP extension is not in the correct format or cannot be resolved by the Domain Name Service (DNS). The correct URI format is http://hostname[:portNumber].

User response

If an OCSP data source has been provided and the ocspEnable parameter is enabled, verify that the certificate being verified has a URI value in the AIA extension that is properly formatted and can be resolved by the DNS. It may be necessary to obtain a new certificate or to specify the ocspProxyServerName and ocspProxyServerPort parameters if there is a need to pass through a firewall. If the ocspURL or ocspProxyServerName parameters are specified, verify that the host name and the IP address is properly formatted and can be resolved by the DNS.

If an CDP data source has been provided and the cdpEnableFlags parameter is enabled for HTTP URIs, verify that the certificate being verified has a URI value in the CDP extension that is properly formatted and can be resolved by the DNS. It may be necessary to obtain a new certificate or to specify the httpCdpProxyServerName and httpCdpProxyServerPort parameters if there is a need to pass through a firewall.

033530A9 An internal error has occurred.

Explanation

The System SSL runtime library detected an internal processing error.

User response

Retry the operation. If the problem persists, collect a System SSL trace containing the error and then contact your service representative.

033530AA Required basic constraints certificate extension is missing

Explanation

During the certificate validation processing for mode RFC 2459 or ANY, an intermediate CA certificate was encountered outside of a trusted certificate source which does not have a basic constraints extension.

User response

The specified untrusted certificate sources that was passed on either the gsk_validate_certificate_mode() or gsk_validate_certificate() API needs to be examined to determine which intermediate CA certificate is being disallowed. Either the intermediate CA certificate should be replaced with a valid Version 3 certificate or if the usage of the CA certificate is acceptable, the certificate needs to be moved to a trusted certificate source and removed from the untrusted certificate source.

If the error persists after adding the certificates, or if the certificates can not be readily obtained, collect a System SSL trace containing the error and then contact your service representative.

033530AB PKCS #12 input certificate has no subject DN or friendly name

Explanation

When reading the certificates of the specified PKCS #12 file, a certificate was encountered that had no subject distinguished name or PKCS #12 friendly name.

User response

Verify that all certificates within the provided PKCS #12 file have either a subject distinguished name or a friendly name attribute. The friendly name attribute or the subject distinguished name is used to create the certificate's label.

033530AC PKCS #12 file name may not end with .kdb, .rdb or .sth

Explanation

A PKCS #12 file name cannot end with .kdb, .rdb or .sth.

User response

Verify that the PKCS #12 file name does not end with .kdb, .rdb or .sth. If it does, it needs to be renamed.

033530AD Required parameter is not set

Explanation

One or more required parameters in the gskdb_ocsp_source, gskdb_cdp_source, or gskdb_extended_directory_source structures within the gskdb_source structure are not correctly set.

User response

If using the gsk_create_revocation_source() routine to create an OCSP data source, the ocspEnable parameter must be set to TRUE or the ocspURL parameter must be specified. If ocspReqLabel is set, the ocspDbHandle must be specified. The ocspDbHandle is the database handle returned by the gsk_open_database() routine or the gsk_open_keyring() routine that contains the name of the certificate specified in the ocspReqLabel parameter.

If using the gsk_create_revocation_source() routine to create an CDP data source, the httpCdpEnableFlags must be set to either GSKCMS_CDP_ENABLE_HTTP or GSKCMS_CDP_ENABLE_ALL.

If using the gsk_create_revocation_source() routine to create an LDAP extended directory source, the ldapServerName parameter must be specified.

033530AE Maximum number of locations allowed to be contacted during certificate validation has been reached

Explanation

The number of locations allowed by either the max_source_rev_ext_loc_values or max_validation_rev_ext_loc_values parameters to gsk_validate_certificate_mode() has been exceeded. The locations for revocation information are specified by the accessLocation in the AIA certificate extension for OCSP and the distributionPoint in the CDP extension for HTTP CRLs.

User response

Use the values in the certificate chain being validated to determine the proper value for the max_source_rev_ext_loc_values parameter, the max_validation_rev_ext_loc_values parameter, or both. The value for max_source_rev_ext_loc_values must be greater than or equal to the maximum number of location values in a certificate CDP or AIA extensions. The value for max_validation_rev_ext_loc_values must be greater than or equal to the total number of location values in all CDP and AIA extensions used in the certificate chain being validated. Collect a System SSL trace containing the error and then contact your service representative if the problem persists.

033530AF HTTP response not received within configured time limit

Explanation

The time limit indicated in the value for httpCdpResponseTimeout in the CDP data source has been exceeded.

User response

Ensure that the HTTP server is available and able to process HTTP CRL requests. Verify that the value for httpCdpResponseTimeout in the CDP data source is sufficient to receive a complete response from the HTTP server.

033530B0 LDAP response not received within configured time limit

Explanation

The time limit indicated in the value for ldapResponseTimeout in the extended directory data source or the time out value specified for the basic directory data source has been exceeded. The basic directory data source time out is specified on the gsk_set_directory_numeric_value() routine

User response

Ensure that the LDAP server is available and able to process LDAP CRL requests. Verify that the time out value for the basic or extended directory data source is sufficient to receive a complete response from the LDAP server.

033530B1 An unknown error has occurred

Explanation

System SSL has detected an unknown processing error.

User response

Collect a System SSL trace containing the error and then contact your service representative.

033530B2 OCSP request failed with try later error

Explanation

The OCSP responder is unable to currently process the OCSP request.

User response

Contact the OCSP responder administrator to verify that the OCSP responder is working properly. Then retry the OCSP request at a later time.

033530B3 Signature algorithm pairs list is not valid.

Explanation

The supported signature algorithm pairs list is not correctly formatted.

User response

Ensure the value that is supplied for the OCSP response signature algorithm pairs in the ocspResponseSigAlgPairs parameter within the gskdb_ocsp_source structure contains only valid entries for hash and signature algorithm pairs that are supported by System SSL and that each entry is defined using 4 characters. See Table 7 for a list of valid 4-character signature algorithm pair definitions.

033530B4 OCSP response signature algorithm not in signature algorithm pairs list.

Explanation

The OCSP response was signed with an algorithm that was not specified in the OCSP response signature algorithm pairs list.

User response

Verify that the signature algorithms included in the response signature algorithm pairs list (the ocspResponseSigAlgPairs parameter within the gskdb_ocsp_source structure) are supported by the OCSP responder and are valid based on the certificate being validated. For example, the OCSP responder may ignore an signature algorithm of SHA-224 with RSA encryption if the certificate being validated is an ECDSA certificate. Ensure that the OCSP responder supports the OCSP preferred signature algorithms extension. The OCSP response signature algorithm pairs list may need to be updated to include the algorithm that the OCSP responder is using to sign the OCSP response. See Table 7 for a list of valid 4-character signature algorithm pair definitions. Collect a System SSL trace containing the error and then contact your service representative if the error persists.

033530B5 Cannot switch from one FIPS mode level to another FIPS mode level

Explanation

While executing in FIPS mode (GSK_FIPS_STATE_ON, GSK_FIPS_STATE_LEVEL1, GSK_FIPS_STATE_LEVEL2, or GSK_FIPS_STATE_LEVEL3), an attempt was made to switch to another FIPS mode LEVEL. This is not supported. Only the switch to GSK_FIPS_STATE_OFF is supported.

User response

A FIPS mode LEVEL has already been defined and the only FIPS mode setting change that is allowed is to GSK_FIPS_STATE_OFF. See System SSL and FIPS 140-2 for additional information about operating in FIPS mode.

033530B6 OCSP request signature algorithm pair is not valid.

Explanation

The OCSP request signature algorithm pair specified in the ocspReqSignatureAlgorithm parameter of the gskdb_ocsp_source structure is not valid. The valid values for the OCSP request signature algorithm pair definitions can be found in Table 3.

User response

Correct the OCSP request signing algorithm that is specified in the ocspReqSignatureAlgorithm parameter of the gskdb_ocsp_source structure to a valid one.

033530B7 OCSP response does not contain requested certificate status.

Explanation

The OCSP response from the OCSP responder does not contain the requested certificate status.

User response

Contact the OCSP responder administrator to verify that the OCSP responder is operating as expected. If the error persists, collect a System SSL trace containing the error and then contact your service representative.

033530B8 OCSP response contains duplicate certificate statuses.

Explanation

The OCSP response from the OCSP responder contains duplicate certificate statuses and it is not possible to determine the revocation status of the requested certificate.

User response

Contact the OCSP responder administrator to verify that the OCSP responder is operating as expected. If the error persists, collect a System SSL trace containing the error and then contact your service representative.

033530B9 Triple DES key parts are not unique

Explanation

While executing in FIPS mode, a triple DES key was found to not have three unique key parts. This can occur with a user supplied session key or when generating a triple DES key.

User response

A user supplied triple DES key was found to not have three unique parts. Ensure the supplied key is valid.

033530BA Certificate does not meet Suite B requirements.

Explanation

The certificate in use does not meet the requirements for the Suite B profile that is selected for the environment.

User response

Ensure that the certificate used satisfies the requirements for the chosen Suite B profile. See Suite B cryptography support for more information about Suite B certificate requirements.

033530BB Certificate database is not supported

Explanation

Verify that the key database being used is supported. If using gskkyman to display a GSKIT CMS V4 key database, the gskkyman command line mode must be used.

User response

Access to a GSKIT CMS V4 certificate key database is only allowed by the gskkyman utility in command line mode or when creating an SSL/TLS connection.

033530BC Time value is not valid

Explanation

The specified timeVal structure contains a sub field value that is not valid. The year of the timeVal that is passed in must be 1970 - 2106 and is the actual year minus 1900. Therefore:
  • tm_year must be 70 - 206.
  • tm_mon must be 0 - 11.
  • tm_day must be 1 - 31.
  • tm_hour must be 0 - 23.
  • tm_min must be 0 - 59.
  • tm_sec must be 0 - 59.

User response

Specify a valid time value.

033530BD Output parameter is not valid

Explanation

An output parameter specified is null or has an invalid value.

User response

Specify a valid output parameter.

033530BE Format is not valid

Explanation

The requested certificate revocation list output format is not valid for encoding a certificate revocation list. Certificate revocation lists can be encoded using base64 encoding or DER encoding formats.

User response

Specify an appropriate certificate revocation list encoding format.

033530BF Expiration date exceeds February 6, 2106 at 23:59:59 UTC

Explanation

System SSL does not support expiration dates that exceed February 6, 2106, at 23:59:59 UTC.

User response

Ensure that the expiration date does not extend past February 6, 2106, at 23:59:59 UTC.

033530C0 RSASSA-PSS digest algorithm is not supported

Explanation

The RSASSA-PSS cryptographic digest algorithm is not supported by the operation or the current level of the System SSL run time. When running in FIPS mode, this error may occur if an attempt is made to use a digest algorithm that is not supported at a specific FIPS mode level. The digest algorithm is specified as part of the RSASSA-PSS parameters. Supported digest types are SHA-256, SHA-384, and SHA-512.

User response

Ensure that the digest algorithm is supported for the requested operation or that it is supported if executing in FIPS mode.

033530C1 RSASSA-PSS mask generation algorithm is not supported

Explanation

The RSASSA-PSS cryptographic mask generation algorithm specified is not supported by the current level of the System SSL run time. Supported mask type is Mgf1.

User response

Ensure that the mask generation algorithm is supported for the requested operation.

033530C2 PKDS RSA private key type not valid for RSASSA-PSS signature generation

Explanation

A secure RSA private key residing in the PKDS is an incorrect type to perform RSASSA-PSS digital signing.

User response

Ensure that the secure private has been generated correctly into the PKDS.

Start of change

033530C3 Input parameter is not valid.

Explanation

The value specified for an input parameter is not a valid value for the requested operation.

User response

Ensure that a valid non-NULL value is specified for the input parameter of the requested operation.

End of change
Start of change

033530C4 Incorrect Suite B certificate key usage

Explanation

TLS Suite B certificate contains extraneous key usage bits.

For TLS Suite B CA certificates, the certificate sign, CRL sign, digital signature and nonRepudiation bits can be set. All other bits are not allowed to be set.

For TLS Suite B end-entity certificates, the digital signature and nonRepudiation bits can be set. All other bits are not allowed to be set.

User response

Obtain a certificate, which contains the allowed key usage settings.

End of change