By type
2021-04-14 02:11:12,104 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-14 02:11:16,407 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.2.4.RELEASE)
2021-04-14 02:11:19.418 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
2021-04-14 02:11:31.927 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-14 02:11:33.036 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2021-04-14 02:11:33.818 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-14 02:11:48.810 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.388 seconds (JVM running for 47.154)
2021-04-14 02:21:55.618 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-04-14 02:21:55.714 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-04-14 02:21:55.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] }
2021-04-14 02:21:56.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 02:21:56.104 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] }
2021-04-14 02:21:56.109 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-04-14 02:21:56.118 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-04-14 02:21:56.119 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 02:21:56.120 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-04-14 02:21:56.211 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-04-14 02:21:56.217 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-04-14 02:21:56.406 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-04-14 02:21:56.416 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 02:21:56.417 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 02:21:56.513 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 02:21:58.132 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-04-14 02:21:58.136 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-04-14 02:21:58.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-04-14 02:21:58.206 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994
2021-04-14 02:21:58.207 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-04-14 02:21:58.213 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 02:21:58.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-04-14 02:21:58.306 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-04-14 02:21:58.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 02:21:58.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 02:21:58.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 02:21:58.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 02:21:58.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 02:21:58.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 02:21:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 02:21:58.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 728595210683353115030256452888859943805357419252
IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Wed Apr 14 02:07:27 UTC 2021
Final Date: Mon Apr 14 02:07:27 UTC 2031
SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4
9f2f77493bdcd57037c10d6b257accd9f0210c6e
38743a08d988e625dd9cb0f7f3fe0f239c794e7d
24b92a1a6f848e70f8221b6abec79afca114804a
8765c5c445a5bf6caa6802efceb5b3cd25d6adbd
b49b0c622024479ea6afc9d3a1ab6816f4b9373a
3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5
a72bfa8d52b925358adf2359c225987affd0c9ec
0ede21e01c10a3f33b3919838b1ed74be5b31e78
733057b1f932d822f86bb49ed3402ad247752d05
ed14efae16f645da4c52c2d332c5aeae5d715401
fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e
c9a2f167c4e464735a35387aa5d0d4fe18445c16
83072f859299575b7cf89e6bbc57de7fb78d1437
04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0
098a67a5c85efee77e67e2a825ba219e2b67c120
6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b
00d9654ec540869ee0d7451dd2eb7f858be833b2
e630a757a60e4a7addd08036e48e2f8dd2273289
3c7ee2d6
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [d2:80:64:f9:5b:d7:37:be:00:18:6c:90:7b:e6:69:2e:99:1e:ad:c3]
modulus: 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
public exponent: 10001
]
2021-04-14 03:15:08.928 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-04-14 03:15:09.003 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-04-14 03:15:09.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] }
2021-04-14 03:15:09.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 03:15:09.016 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] }
2021-04-14 03:15:09.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-04-14 03:15:09.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-04-14 03:15:09.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-04-14 03:15:09.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-04-14 03:15:09.112 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-04-14 03:15:09.114 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:15:09.114 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:15:09.121 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 03:15:09.505 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-04-14 03:15:09.506 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-04-14 03:15:09.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-04-14 03:15:09.513 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994
2021-04-14 03:15:09.513 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-04-14 03:15:09.602 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 03:15:09.603 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-04-14 03:15:09.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-04-14 03:15:09.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:15:09.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:15:09.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:15:09.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:15:09.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:15:09.613 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:15:09.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 03:15:09.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 728595210683353115030256452888859943805357419252
IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Wed Apr 14 02:07:27 UTC 2021
Final Date: Mon Apr 14 02:07:27 UTC 2031
SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4
9f2f77493bdcd57037c10d6b257accd9f0210c6e
38743a08d988e625dd9cb0f7f3fe0f239c794e7d
24b92a1a6f848e70f8221b6abec79afca114804a
8765c5c445a5bf6caa6802efceb5b3cd25d6adbd
b49b0c622024479ea6afc9d3a1ab6816f4b9373a
3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5
a72bfa8d52b925358adf2359c225987affd0c9ec
0ede21e01c10a3f33b3919838b1ed74be5b31e78
733057b1f932d822f86bb49ed3402ad247752d05
ed14efae16f645da4c52c2d332c5aeae5d715401
fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e
c9a2f167c4e464735a35387aa5d0d4fe18445c16
83072f859299575b7cf89e6bbc57de7fb78d1437
04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0
098a67a5c85efee77e67e2a825ba219e2b67c120
6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b
00d9654ec540869ee0d7451dd2eb7f858be833b2
e630a757a60e4a7addd08036e48e2f8dd2273289
3c7ee2d6
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [e7:d9:5d:00:3e:54:4a:da:99:29:81:d5:57:70:06:80:15:89:29:bf]
modulus: 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
public exponent: 10001
]
2021-04-14 03:17:47.614 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-04-14 03:17:47.615 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-04-14 03:17:47.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 03:17:47.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 03:17:47.618 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 03:17:47.619 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-04-14 03:17:47.619 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-04-14 03:17:47.620 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-04-14 03:17:47.620 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-04-14 03:17:47.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-04-14 03:17:47.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:17:47.706 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:17:47.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 03:17:47.931 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-04-14 03:17:47.932 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-04-14 03:17:47.935 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-04-14 03:17:47.937 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994
2021-04-14 03:17:47.938 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-04-14 03:17:48.008 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 03:17:48.010 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-04-14 03:17:48.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-04-14 03:17:48.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:17:48.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:17:48.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:17:48.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:17:48.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:17:48.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:17:48.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 03:17:48.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 728595210683353115030256452888859943805357419252
IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Wed Apr 14 02:07:27 UTC 2021
Final Date: Mon Apr 14 02:07:27 UTC 2031
SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4
9f2f77493bdcd57037c10d6b257accd9f0210c6e
38743a08d988e625dd9cb0f7f3fe0f239c794e7d
24b92a1a6f848e70f8221b6abec79afca114804a
8765c5c445a5bf6caa6802efceb5b3cd25d6adbd
b49b0c622024479ea6afc9d3a1ab6816f4b9373a
3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5
a72bfa8d52b925358adf2359c225987affd0c9ec
0ede21e01c10a3f33b3919838b1ed74be5b31e78
733057b1f932d822f86bb49ed3402ad247752d05
ed14efae16f645da4c52c2d332c5aeae5d715401
fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e
c9a2f167c4e464735a35387aa5d0d4fe18445c16
83072f859299575b7cf89e6bbc57de7fb78d1437
04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0
098a67a5c85efee77e67e2a825ba219e2b67c120
6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b
00d9654ec540869ee0d7451dd2eb7f858be833b2
e630a757a60e4a7addd08036e48e2f8dd2273289
3c7ee2d6
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [e8:01:da:65:20:d8:b3:4b:44:89:5e:06:b0:b9:e3:d7:86:dc:99:6b]
modulus: 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
public exponent: 10001
]
2021-04-14 03:19:38.161 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-04-14 03:19:38.163 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-04-14 03:19:38.164 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] }
2021-04-14 03:19:38.165 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 03:19:38.166 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] }
2021-04-14 03:19:38.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-04-14 03:19:38.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-04-14 03:19:38.168 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-04-14 03:19:38.169 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-04-14 03:19:38.202 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-04-14 03:19:38.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:19:38.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-04-14 03:19:38.205 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 03:19:38.336 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-04-14 03:19:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-04-14 03:19:38.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-04-14 03:19:38.408 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994
2021-04-14 03:19:38.409 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-04-14 03:19:38.411 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 03:19:38.412 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-04-14 03:19:38.413 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-04-14 03:19:38.413 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:19:38.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:19:38.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:19:38.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 03:19:38.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-04-14 03:19:38.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-04-14 03:19:38.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 03:19:38.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 728595210683353115030256452888859943805357419252
IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Wed Apr 14 02:07:27 UTC 2021
Final Date: Mon Apr 14 02:07:27 UTC 2031
SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85]
modulus: b7f09aec105a63f1a0f2781190b1b95cca21e9fc587075b3e61516d9d0d9ac509860864c368d22ecf1716b97c65c7d9285110e52513398012f7b10b6148f8102593b56a8e4ffb49b41f48382be37af5b15fa2c8aba03585804c448fe84e71507f0eef3eddb0588dc8db42a0f4886a84ac2011d39803f90e12e13337b2fc33590f77dbecc70231726193ffd95e25b42cc38fac1a7d8cbedb27385716229e0b83b4af9e70a705083e615e40108e657ecab6afd02b43c1e35ee79f476ad6f602fd34df2d6b7bff8d25932ddc7119f6f1016b8e621063fced6b1704cf5d116609e69bc36f76df0fd6effb3366bbaeb165358af488305eaf1cb607b0889ef5c9acbb071fe7c01497727bac20661623744ac0debb8d312d3761d6e0107063957a07c21917ac52591b08c9f205eeb66b3c72021ada4ef902b6b769640abeb57f247e1ea16800a6b69d8f30a5780294a0529527793588880a9f0600143cf8473f9d7ec6a9f030b6b9a2937c4acee2d50e7f8a349eca84a67cf37a42e17f8f763b4548051
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4
9f2f77493bdcd57037c10d6b257accd9f0210c6e
38743a08d988e625dd9cb0f7f3fe0f239c794e7d
24b92a1a6f848e70f8221b6abec79afca114804a
8765c5c445a5bf6caa6802efceb5b3cd25d6adbd
b49b0c622024479ea6afc9d3a1ab6816f4b9373a
3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5
a72bfa8d52b925358adf2359c225987affd0c9ec
0ede21e01c10a3f33b3919838b1ed74be5b31e78
733057b1f932d822f86bb49ed3402ad247752d05
ed14efae16f645da4c52c2d332c5aeae5d715401
fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e
c9a2f167c4e464735a35387aa5d0d4fe18445c16
83072f859299575b7cf89e6bbc57de7fb78d1437
04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0
098a67a5c85efee77e67e2a825ba219e2b67c120
6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b
00d9654ec540869ee0d7451dd2eb7f858be833b2
e630a757a60e4a7addd08036e48e2f8dd2273289
3c7ee2d6
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [25:a6:72:16:61:a7:90:e9:fc:13:4c:8e:bb:8a:13:24:68:e8:88:e0]
modulus: 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
public exponent: 10001
]