By type
2021-09-04 01:49:03,589 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-04 01:49:07,292 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.2.4.RELEASE)
2021-09-04 01:49:09.984 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
2021-09-04 01:49:20.784 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-04 01:49:21.896 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2021-09-04 01:49:22.782 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-04 01:49:34.386 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 32.89 seconds (JVM running for 39.406)
2021-09-04 01:50:03.680 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 01:50:03.690 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 01:50:03.789 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-04 01:50:03.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 01:50:03.877 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-04 01:50:03.880 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 01:50:03.885 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 01:50:03.886 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 01:50:03.886 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 01:50:03.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 01:50:03.896 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 01:50:04.176 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 01:50:04.181 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 01:50:04.182 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 01:50:04.194 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 01:50:05.690 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 01:50:05.694 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 01:50:05.695 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 01:50:05.702 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 01:50:05.705 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 01:50:05.774 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 01:50:05.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 01:50:05.778 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 01:50:05.784 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 01:50:05.785 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 01:50:05.786 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 01:50:05.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 01:50:05.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 01:50:05.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 01:50:05.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 01:50:05.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 01:50:05.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 01:50:05.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [41:ed:91:37:16:51:27:86:7f:c1:94:3a:2d:31:cc:ea:51:fc:64:0f]
modulus: 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
public exponent: 10001
]
2021-09-04 03:57:49.191 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 03:57:49.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 03:57:49.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-04 03:57:49.195 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 03:57:49.196 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-04 03:57:49.196 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 03:57:49.197 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 03:57:49.197 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 03:57:49.197 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 03:57:49.276 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 03:57:49.277 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 03:57:49.278 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 03:57:49.280 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 03:57:49.363 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 03:57:49.374 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 03:57:49.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 03:57:49.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 03:57:49.378 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 03:57:49.378 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 03:57:49.381 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 03:57:49.382 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 03:57:49.382 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 03:57:49.382 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 03:57:49.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 03:57:49.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 03:57:49.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 03:57:49.385 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 03:57:49.385 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 03:57:49.385 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 03:57:49.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 03:57:49.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [0b:2a:2c:12:cd:0e:00:45:e9:21:59:85:37:9f:45:00:1b:6e:f0:3d]
modulus: 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
public exponent: 10001
]
2021-09-04 04:00:42.637 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:00:42.638 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:00:42.639 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-04 04:00:42.640 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:00:42.641 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-04 04:00:42.641 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:00:42.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:00:42.642 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:00:42.643 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:00:42.649 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:00:42.649 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:00:42.649 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:00:42.652 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:00:42.746 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:00:42.747 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:00:42.747 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:00:42.749 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:00:42.750 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:00:42.750 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:00:42.774 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:00:42.775 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:00:42.775 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:00:42.776 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:00:42.776 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:00:42.777 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:00:42.777 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:00:42.778 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:00:42.779 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:00:42.779 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:00:42.780 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:00:42.782 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [99:6e:4f:71:1e:04:11:85:26:c0:97:9d:be:31:d5:1a:a8:9a:d0:f9]
modulus: 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
public exponent: 10001
]
2021-09-04 04:00:45.401 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:00:45.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:00:45.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-04 04:00:45.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:00:45.404 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-04 04:00:45.404 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:00:45.405 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:00:45.405 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:00:45.405 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:00:45.410 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:00:45.410 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:00:45.411 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:00:45.412 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:00:45.529 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:00:45.529 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:00:45.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:00:45.531 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:00:45.531 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:00:45.532 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:00:45.533 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:00:45.533 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:00:45.534 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:00:45.534 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:00:45.534 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:00:45.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:00:45.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:00:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:00:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:00:45.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:00:45.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:00:45.539 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [c3:b5:8a:b5:4c:54:10:db:69:88:c1:b3:f0:3a:4c:3b:1e:03:32:49]
modulus: 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
public exponent: 10001
]
2021-09-04 04:03:17.187 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:03:17.188 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:03:17.190 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-04 04:03:17.190 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:03:17.191 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-04 04:03:17.191 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:03:17.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:03:17.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:03:17.193 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:03:17.199 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:03:17.199 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:03:17.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:03:17.202 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:03:17.340 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:03:17.341 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:03:17.341 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:03:17.376 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:03:17.377 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:03:17.377 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:03:17.378 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:03:17.379 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:03:17.379 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:03:17.379 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:03:17.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:03:17.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:03:17.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:03:17.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:03:17.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:03:17.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:03:17.382 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:03:17.385 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: b607c4639684a33dbe372d06841c86a1ba1fd6bb15518ba4efccce72fa1c396b624f75b293817f9c017cc4a632a17910dc7e3a6f9218290bd0088cdd884368e45b2a059e226c13e87d32e9bf73b27f5193ad37c65aca233304d783490912086fe6c2593add7ec7799572aedf3e456715399398152c7e40ce5643f25285bada62d961813626d4e948e3a70fc08c30a9cad833d2469b45a8000c0fa3c7a669ff385252051d811af722da5fac61244038b9d10a18a990247b4547c0cb4a1b2997803a50c7f2994f6277eecf1a2748bdca219a0bc1944f3acf351862eb6622a6bdad8b4d80527794317f19e7c11378126e575d432e2fd5f883f964bd6becb852101582ee873a9d3354f03d10ef5382d153e37e7fbcb9dc8d506726e4f06e33a48bbc18f776620b96252d211275208aa6db52ad4e994910600edc31aa3520d06bf265df20f8acda35cd31e52e902d162bc930f5ceebb8c71d24ffe752ceee6645c15dbbc157719e3f0d5538d390f88ae42f72fc26db793c3684a80b582a7c0c6bf5a1
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [8b:d1:e0:4b:d7:7f:77:29:23:71:0c:bc:52:8e:4e:2f:7b:1d:f8:66]
modulus: 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
public exponent: 10001
]
2021-09-04 04:05:43.202 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:05:43.203 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:05:43.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-04 04:05:43.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:05:43.205 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-04 04:05:43.205 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:05:43.206 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:05:43.206 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:05:43.206 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:05:43.211 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:05:43.211 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:05:43.211 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:05:43.213 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:05:43.336 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:05:43.336 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:05:43.337 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:05:43.338 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:05:43.338 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:05:43.339 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:05:43.340 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:05:43.340 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:05:43.341 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:05:43.341 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:05:43.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:05:43.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:05:43.342 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:05:43.344 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:05:43.344 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:05:43.345 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:05:43.345 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:05:43.348 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [13:71:f9:f9:d0:dd:cd:4d:05:28:e8:49:16:88:75:c6:22:96:44:67]
modulus: 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
public exponent: 10001
]
2021-09-04 04:06:12.237 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:06:12.238 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:06:12.239 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-04 04:06:12.239 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:06:12.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-04 04:06:12.240 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:06:12.241 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:06:12.241 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:06:12.241 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:06:12.245 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:06:12.246 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:06:12.246 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:06:12.247 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:06:12.338 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:06:12.338 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:06:12.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:06:12.339 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:06:12.340 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:06:12.340 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:06:12.341 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:06:12.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:06:12.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:06:12.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:06:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:06:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:06:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:06:12.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:06:12.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:06:12.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:06:12.345 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:06:12.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [04:61:52:6d:64:8f:6e:ee:f1:dc:bf:f3:bd:85:82:15:46:d8:05:ab]
modulus: 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
public exponent: 10001
]
2021-09-04 04:06:45.282 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:06:45.284 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:06:45.285 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-04 04:06:45.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:06:45.286 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-04 04:06:45.287 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:06:45.287 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:06:45.288 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:06:45.288 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:06:45.293 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:06:45.294 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:06:45.294 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:06:45.296 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:06:45.355 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:06:45.374 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:06:45.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:06:45.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:06:45.376 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:06:45.376 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:06:45.378 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:06:45.378 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:06:45.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:06:45.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:06:45.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:06:45.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:06:45.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:06:45.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:06:45.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: b607c4639684a33dbe372d06841c86a1ba1fd6bb15518ba4efccce72fa1c396b624f75b293817f9c017cc4a632a17910dc7e3a6f9218290bd0088cdd884368e45b2a059e226c13e87d32e9bf73b27f5193ad37c65aca233304d783490912086fe6c2593add7ec7799572aedf3e456715399398152c7e40ce5643f25285bada62d961813626d4e948e3a70fc08c30a9cad833d2469b45a8000c0fa3c7a669ff385252051d811af722da5fac61244038b9d10a18a990247b4547c0cb4a1b2997803a50c7f2994f6277eecf1a2748bdca219a0bc1944f3acf351862eb6622a6bdad8b4d80527794317f19e7c11378126e575d432e2fd5f883f964bd6becb852101582ee873a9d3354f03d10ef5382d153e37e7fbcb9dc8d506726e4f06e33a48bbc18f776620b96252d211275208aa6db52ad4e994910600edc31aa3520d06bf265df20f8acda35cd31e52e902d162bc930f5ceebb8c71d24ffe752ceee6645c15dbbc157719e3f0d5538d390f88ae42f72fc26db793c3684a80b582a7c0c6bf5a1
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [eb:fd:ab:54:9a:fe:da:60:13:b6:33:eb:2a:c6:f5:ba:43:4a:70:c3]
modulus: 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
public exponent: 10001
]
2021-09-04 04:08:31.303 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA
2021-09-04 04:08:31.304 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-09-04 04:08:31.304 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-04 04:08:31.305 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-04 04:08:31.305 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-04 04:08:31.306 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA
2021-09-04 04:08:31.306 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-09-04 04:08:31.306 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-09-04 04:08:31.306 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-09-04 04:08:31.310 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-09-04 04:08:31.311 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:08:31.311 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-09-04 04:08:31.312 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-09-04 04:08:31.388 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-09-04 04:08:31.389 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1
2021-09-04 04:08:31.389 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response.
2021-09-04 04:08:31.390 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response.
2021-09-04 04:08:31.392 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1275
2021-09-04 04:08:31.392 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26
2021-09-04 04:08:31.393 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-04 04:08:31.393 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server.
2021-09-04 04:08:31.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0
2021-09-04 04:08:31.394 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-09-04 04:08:31.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:08:31.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:08:31.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:08:31.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-04 04:08:31.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-09-04 04:08:31.396 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-09-04 04:08:31.397 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-04 04:08:31.475 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 47745101073801081464380379219284004136824108445
IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sat Sep 04 01:44:51 UTC 2021
Final Date: Thu Sep 04 01:44:50 UTC 2031
SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a
5c906b35ee7fef7cf05ef8ba430478c43036cd25
6395338656d4279e8ea891ab211edf3863d16aeb
d7d29937baa808392e5250fb2d50969f650db912
6938d7086f4a4ac67eeed98f1bc59d0568489a20
a772963fad3be2ca12de9def5274e0cd26a09574
cbe5a1a536c28a95eeab799a877272e8654f5fa4
c0d859954afe3252062bf83dcbe0d6b50649c3c4
b6364bde1e489d6d31a84b73c606e973fd6af2e3
916e0d39edf599b9e2de3aa3a08cb0100f6bafba
74b3460bbe9e707da1d0e78b4529bc6878360fcc
aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2
38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f
992a97a12659f16334fc263bacef942890eb4bf0
d247d3c86956413019ccb9998fcc60217d23d3db
ff790ea3675bdb8a229edfdbbbeb64d293e50bc5
a39c04a2c833ce4ddf11226f430ee9c845274706
4204efc47e43d2782e29585c803692b65c08897b
91d11824abe64a8daa43882def1612c3ec3ac55c
2cf1700c
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [94:74:a8:51:6c:98:8e:17:27:ed:a5:1e:51:20:35:e8:95:32:f8:5f]
modulus: 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
public exponent: 10001
]