By type
2021-04-14 02:11:12,104 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-14 02:11:16,407 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-14 02:11:19.418 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-04-14 02:11:31.927 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-14 02:11:33.036 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-04-14 02:11:33.818 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-14 02:11:48.810 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.388 seconds (JVM running for 47.154) 2021-04-14 02:21:55.618 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-14 02:21:55.714 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-14 02:21:55.917 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-04-14 02:21:56.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-14 02:21:56.104 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-04-14 02:21:56.109 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-14 02:21:56.118 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-14 02:21:56.119 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 02:21:56.120 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-14 02:21:56.211 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-14 02:21:56.217 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-14 02:21:56.406 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-14 02:21:56.416 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 02:21:56.417 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 02:21:56.513 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-14 02:21:58.132 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-14 02:21:58.136 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-14 02:21:58.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-14 02:21:58.206 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994 2021-04-14 02:21:58.207 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-14 02:21:58.213 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-14 02:21:58.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-14 02:21:58.306 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-14 02:21:58.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 02:21:58.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 02:21:58.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 02:21:58.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 02:21:58.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 02:21:58.320 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 02:21:58.409 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-14 02:21:58.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 728595210683353115030256452888859943805357419252 IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 14 02:07:27 UTC 2021 Final Date: Mon Apr 14 02:07:27 UTC 2031 SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4 9f2f77493bdcd57037c10d6b257accd9f0210c6e 38743a08d988e625dd9cb0f7f3fe0f239c794e7d 24b92a1a6f848e70f8221b6abec79afca114804a 8765c5c445a5bf6caa6802efceb5b3cd25d6adbd b49b0c622024479ea6afc9d3a1ab6816f4b9373a 3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5 a72bfa8d52b925358adf2359c225987affd0c9ec 0ede21e01c10a3f33b3919838b1ed74be5b31e78 733057b1f932d822f86bb49ed3402ad247752d05 ed14efae16f645da4c52c2d332c5aeae5d715401 fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e c9a2f167c4e464735a35387aa5d0d4fe18445c16 83072f859299575b7cf89e6bbc57de7fb78d1437 04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0 098a67a5c85efee77e67e2a825ba219e2b67c120 6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b 00d9654ec540869ee0d7451dd2eb7f858be833b2 e630a757a60e4a7addd08036e48e2f8dd2273289 3c7ee2d6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:80:64:f9:5b:d7:37:be:00:18:6c:90:7b:e6:69:2e:99:1e:ad:c3] modulus: 9e62a1f9cfcceb2ee883731d6f50d47b408ccee5d6d823507aaf7d6a1880fa1d6cb93936ec80b718786831481b9bd7a855720638b580e4b14a9e8b7e75dd23a5af1c1c46dc4bdb87fd627abe17aee6d97058dd9d8f3fe1a912885a9f091ab8752a2dc743e7b4c201de256bf5a66e2fcc4497b9108b68826d75e7b543bb83016c946b813f3a47fe8fdbdd096cde2f134bfdd0d1e332cac7ebbd3651cccdb220433d4d248410931d4632e859b6847b65ce77d7f3f28d4603df46847a540cca138b71804775f9da823698a37ad1ef5ef1f3760bf63aed7b163608ecd42cfa0f002845970561702a53bac28051237f18e63fe661b389bedd3eea610b4719e241ab09 public exponent: 10001 ] 2021-04-14 03:15:08.928 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-14 03:15:09.003 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-14 03:15:09.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-04-14 03:15:09.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-14 03:15:09.016 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-04-14 03:15:09.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-14 03:15:09.017 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-14 03:15:09.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-14 03:15:09.018 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-14 03:15:09.112 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-14 03:15:09.114 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:15:09.114 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:15:09.121 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-14 03:15:09.505 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-14 03:15:09.506 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-14 03:15:09.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-14 03:15:09.513 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994 2021-04-14 03:15:09.513 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-14 03:15:09.602 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-14 03:15:09.603 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-14 03:15:09.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-14 03:15:09.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:15:09.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:15:09.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:15:09.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:15:09.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:15:09.613 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:15:09.614 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-14 03:15:09.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 728595210683353115030256452888859943805357419252 IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 14 02:07:27 UTC 2021 Final Date: Mon Apr 14 02:07:27 UTC 2031 SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85] modulus: b7f09aec105a63f1a0f2781190b1b95cca21e9fc587075b3e61516d9d0d9ac509860864c368d22ecf1716b97c65c7d9285110e52513398012f7b10b6148f8102593b56a8e4ffb49b41f48382be37af5b15fa2c8aba03585804c448fe84e71507f0eef3eddb0588dc8db42a0f4886a84ac2011d39803f90e12e13337b2fc33590f77dbecc70231726193ffd95e25b42cc38fac1a7d8cbedb27385716229e0b83b4af9e70a705083e615e40108e657ecab6afd02b43c1e35ee79f476ad6f602fd34df2d6b7bff8d25932ddc7119f6f1016b8e621063fced6b1704cf5d116609e69bc36f76df0fd6effb3366bbaeb165358af488305eaf1cb607b0889ef5c9acbb071fe7c01497727bac20661623744ac0debb8d312d3761d6e0107063957a07c21917ac52591b08c9f205eeb66b3c72021ada4ef902b6b769640abeb57f247e1ea16800a6b69d8f30a5780294a0529527793588880a9f0600143cf8473f9d7ec6a9f030b6b9a2937c4acee2d50e7f8a349eca84a67cf37a42e17f8f763b4548051 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4 9f2f77493bdcd57037c10d6b257accd9f0210c6e 38743a08d988e625dd9cb0f7f3fe0f239c794e7d 24b92a1a6f848e70f8221b6abec79afca114804a 8765c5c445a5bf6caa6802efceb5b3cd25d6adbd b49b0c622024479ea6afc9d3a1ab6816f4b9373a 3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5 a72bfa8d52b925358adf2359c225987affd0c9ec 0ede21e01c10a3f33b3919838b1ed74be5b31e78 733057b1f932d822f86bb49ed3402ad247752d05 ed14efae16f645da4c52c2d332c5aeae5d715401 fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e c9a2f167c4e464735a35387aa5d0d4fe18445c16 83072f859299575b7cf89e6bbc57de7fb78d1437 04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0 098a67a5c85efee77e67e2a825ba219e2b67c120 6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b 00d9654ec540869ee0d7451dd2eb7f858be833b2 e630a757a60e4a7addd08036e48e2f8dd2273289 3c7ee2d6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:d9:5d:00:3e:54:4a:da:99:29:81:d5:57:70:06:80:15:89:29:bf] modulus: 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 public exponent: 10001 ] 2021-04-14 03:17:47.614 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-14 03:17:47.615 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-14 03:17:47.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-14 03:17:47.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-14 03:17:47.618 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-14 03:17:47.619 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-14 03:17:47.619 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-14 03:17:47.620 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-14 03:17:47.620 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-14 03:17:47.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-14 03:17:47.705 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:17:47.706 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:17:47.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-14 03:17:47.931 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-14 03:17:47.932 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-14 03:17:47.935 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-14 03:17:47.937 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994 2021-04-14 03:17:47.938 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-14 03:17:48.008 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-14 03:17:48.010 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-14 03:17:48.014 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-14 03:17:48.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:17:48.015 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:17:48.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:17:48.016 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:17:48.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:17:48.017 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:17:48.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-14 03:17:48.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 728595210683353115030256452888859943805357419252 IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 14 02:07:27 UTC 2021 Final Date: Mon Apr 14 02:07:27 UTC 2031 SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85] modulus: b7f09aec105a63f1a0f2781190b1b95cca21e9fc587075b3e61516d9d0d9ac509860864c368d22ecf1716b97c65c7d9285110e52513398012f7b10b6148f8102593b56a8e4ffb49b41f48382be37af5b15fa2c8aba03585804c448fe84e71507f0eef3eddb0588dc8db42a0f4886a84ac2011d39803f90e12e13337b2fc33590f77dbecc70231726193ffd95e25b42cc38fac1a7d8cbedb27385716229e0b83b4af9e70a705083e615e40108e657ecab6afd02b43c1e35ee79f476ad6f602fd34df2d6b7bff8d25932ddc7119f6f1016b8e621063fced6b1704cf5d116609e69bc36f76df0fd6effb3366bbaeb165358af488305eaf1cb607b0889ef5c9acbb071fe7c01497727bac20661623744ac0debb8d312d3761d6e0107063957a07c21917ac52591b08c9f205eeb66b3c72021ada4ef902b6b769640abeb57f247e1ea16800a6b69d8f30a5780294a0529527793588880a9f0600143cf8473f9d7ec6a9f030b6b9a2937c4acee2d50e7f8a349eca84a67cf37a42e17f8f763b4548051 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4 9f2f77493bdcd57037c10d6b257accd9f0210c6e 38743a08d988e625dd9cb0f7f3fe0f239c794e7d 24b92a1a6f848e70f8221b6abec79afca114804a 8765c5c445a5bf6caa6802efceb5b3cd25d6adbd b49b0c622024479ea6afc9d3a1ab6816f4b9373a 3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5 a72bfa8d52b925358adf2359c225987affd0c9ec 0ede21e01c10a3f33b3919838b1ed74be5b31e78 733057b1f932d822f86bb49ed3402ad247752d05 ed14efae16f645da4c52c2d332c5aeae5d715401 fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e c9a2f167c4e464735a35387aa5d0d4fe18445c16 83072f859299575b7cf89e6bbc57de7fb78d1437 04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0 098a67a5c85efee77e67e2a825ba219e2b67c120 6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b 00d9654ec540869ee0d7451dd2eb7f858be833b2 e630a757a60e4a7addd08036e48e2f8dd2273289 3c7ee2d6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:01:da:65:20:d8:b3:4b:44:89:5e:06:b0:b9:e3:d7:86:dc:99:6b] modulus: 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 public exponent: 10001 ] 2021-04-14 03:19:38.161 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-04-14 03:19:38.163 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-04-14 03:19:38.164 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-04-14 03:19:38.165 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-14 03:19:38.166 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-04-14 03:19:38.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-14 03:19:38.167 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-04-14 03:19:38.168 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-04-14 03:19:38.169 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-04-14 03:19:38.202 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-04-14 03:19:38.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:19:38.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-04-14 03:19:38.205 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-04-14 03:19:38.336 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-04-14 03:19:38.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-04-14 03:19:38.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-04-14 03:19:38.408 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1994 2021-04-14 03:19:38.409 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-04-14 03:19:38.411 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-14 03:19:38.412 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-04-14 03:19:38.413 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-04-14 03:19:38.413 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:19:38.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:19:38.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:19:38.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-14 03:19:38.415 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-04-14 03:19:38.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-04-14 03:19:38.417 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-14 03:19:38.505 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 728595210683353115030256452888859943805357419252 IssuerDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 14 02:07:27 UTC 2021 Final Date: Mon Apr 14 02:07:27 UTC 2031 SubjectDN: UID=c-033a9d2d9dc6daadf,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:6d:a2:27:a1:8a:c3:23:e9:17:c2:f0:e1:08:19:c3:fa:c4:e4:85] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 850b1e504d1341e9bac8ef642860eeef4072b5b4 9f2f77493bdcd57037c10d6b257accd9f0210c6e 38743a08d988e625dd9cb0f7f3fe0f239c794e7d 24b92a1a6f848e70f8221b6abec79afca114804a 8765c5c445a5bf6caa6802efceb5b3cd25d6adbd b49b0c622024479ea6afc9d3a1ab6816f4b9373a 3f99c5feeff1a1bd4b2dd57bb5b7cb41de1fd2f5 a72bfa8d52b925358adf2359c225987affd0c9ec 0ede21e01c10a3f33b3919838b1ed74be5b31e78 733057b1f932d822f86bb49ed3402ad247752d05 ed14efae16f645da4c52c2d332c5aeae5d715401 fa2adb27ec38ccbc934cac04ded6fb80f7b7ff4e c9a2f167c4e464735a35387aa5d0d4fe18445c16 83072f859299575b7cf89e6bbc57de7fb78d1437 04e8b4d7b7fdc343fb69f3f5c2f2f0dfb8c6d4e0 098a67a5c85efee77e67e2a825ba219e2b67c120 6c6d5ecc66f68830eaaf6c8b02013fdd5098af8b 00d9654ec540869ee0d7451dd2eb7f858be833b2 e630a757a60e4a7addd08036e48e2f8dd2273289 3c7ee2d6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:a6:72:16:61:a7:90:e9:fc:13:4c:8e:bb:8a:13:24:68:e8:88:e0] modulus: 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 public exponent: 10001 ]