By type
2021-11-04 01:26:02,214 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-04 01:26:06,199 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.2.4.RELEASE)
2021-11-04 01:26:09.015 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
2021-11-04 01:26:20.503 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-04 01:26:21.613 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2021-11-04 01:26:22.297 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-04 01:26:32.704 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 32.306 seconds (JVM running for 38.175)
2021-11-04 01:27:56.409 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 01:27:56.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 01:27:56.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-04 01:27:56.614 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 01:27:56.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-04 01:27:56.708 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 01:27:56.709 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 01:27:56.792 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 01:27:56.793 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 01:27:56.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 01:27:56.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 01:27:56.813 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 01:27:56.914 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 01:27:56.918 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 01:27:56.992 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 01:27:56.995 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 01:27:58.003 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 01:27:58.006 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 01:27:58.007 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 01:27:58.009 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 01:27:58.094 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 01:27:58.095 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 01:27:58.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.109 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.109 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.110 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.192 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 01:27:58.193 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 01:27:58.193 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 01:27:58.195 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 01:27:58.297 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [78:b7:48:fa:ce:26:62:3c:e2:63:f0:48:51:e2:b9:9a:09:70:2e:26]
modulus: e4ccbde32c509b4ce2ebede0afec489da2a75d89b63a0698c776a22c8346aef3c7fff6eac82802c68f793f705e0bb2720410dc8ef57d8a98155089da4b71619591481060fe38a7881292ebd3613777f697ad6c597ab3641ca32739a03453e9a712714b9141b47d795122bea828bfbd2a8865b4e53213c5b43900e634f05756ddc245fd6ee420aafdd31e0dc702fa14ba0cfa221a21318c6e0d881a7783c6b6a97382887343ff326f58c1c7b48e9941cd83653e451cda23805eeda4714dc3ce309fbfc57b90a23f1a776b45ee5500dd98bb27961fce9b39fbca91e34732e48761c76e06ccf855f357773ea645ea459ae3a9d2830ce54aef0d8b9326daf14c3f57
public exponent: 10001
]
2021-11-04 04:36:24.848 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:36:24.850 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:36:24.852 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-04 04:36:24.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:36:24.854 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-04 04:36:24.855 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:36:24.855 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:36:24.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:36:24.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:36:24.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:36:24.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:36:24.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:36:24.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:36:24.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:36:25.103 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:36:25.104 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:36:25.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:36:25.105 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:36:25.107 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:36:25.108 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:36:25.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:36:25.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:36:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:36:25.114 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:36:25.118 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: b553a41588263a5d85a2614ab52418477c5fa3722afd7c6aa2cf2005d245fd67ccd3ca29b9adfe906f01521cd944a8f2d872d30d5f4b639f692bcad8905e08e19a1cd09116b38758c37734aebed40a53d4359839111da0b4ba7ee06a7562398f2e8466866b6ec785c3dc5d3d079639388dfba4a3d6a8c9327f0875986b68cf84c2e19e7228ef647049e5a0339dad907746ad79b18a2650d26c75043c513df1dc8a135d34c67eae7ddf03270794389e58794be0d77f71316edcc62a40e4a3484939492b20316b2ae3725f85d8fcde030bd73034349b22813e5db591254ea15fa31368c7a50b8bae0e2afb40bc9e1a9b68f3c38deb50986bddc0d31577b7da936e934c115358cfd88819788f981ec381f772b2e7bb13a278082f3bfe2f003a733a00dfecd5cc6a8d16acbd6a16326b0b82bb52eb2198ea135dea56936d0ba2b7f263de856045e2edbcf268d3cf478509ceb2e67e6b295fe6093328a60bb5b1243adce4ad0b7b9f9b2c0556a8f826c8d059fec9f919f09bd8424dbd5c63bc3c58f5
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [af:2d:2e:ba:c8:55:af:fe:bd:47:a6:f9:56:94:ca:47:0e:aa:ab:94]
modulus: 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
public exponent: 10001
]
2021-11-04 04:38:38.183 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:38:38.184 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:38:38.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:38:38.185 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:38:38.186 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:38:38.187 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:38:38.187 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:38:38.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:38:38.188 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:38:38.189 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:38:38.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:38:38.198 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:38:38.198 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:38:38.198 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:38:38.288 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:38:38.288 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:38:38.289 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:38:38.289 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:38:38.293 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:38:38.294 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:38:38.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.295 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.298 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:38:38.299 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:38:38.299 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:38:38.300 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:38:38.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3a:5e:e8:a5:20:2b:f2:48:aa:b1:1b:92:66:87:50:d7:16:e0:51:ed]
modulus: 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
public exponent: 10001
]
2021-11-04 04:40:40.633 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:40:40.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:40:40.637 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:40.638 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:40:40.639 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:40.640 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:40:40.640 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:40:40.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:40:40.641 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:40:40.642 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:40:40.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:40:40.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:40:40.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:40:40.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:40.792 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:40:40.793 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:40:40.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:40:40.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:40.794 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:40:40.795 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:40:40.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.797 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:40.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:40.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:40.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:40:40.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [92:23:be:71:80:8e:8e:ab:5f:06:72:6d:4d:24:87:e2:4c:e5:09:e9]
modulus: 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
public exponent: 10001
]
2021-11-04 04:40:47.745 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:40:47.746 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:40:47.747 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:47.747 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:40:47.748 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-04 04:40:47.748 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:40:47.749 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:40:47.749 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:40:47.749 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:40:47.750 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:40:47.757 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:40:47.757 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:40:47.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:40:47.758 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:47.862 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:40:47.892 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:40:47.892 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:40:47.893 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:40:47.894 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:40:47.894 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:40:47.894 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.895 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.895 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.896 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.896 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.896 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:40:47.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:40:47.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:40:47.898 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:40:47.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [41:bd:38:97:36:5d:68:db:6f:93:e8:ee:a0:08:98:1f:38:e5:93:29]
modulus: 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
public exponent: 10001
]
2021-11-04 04:41:12.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:41:12.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:41:12.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-04 04:41:12.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:41:12.918 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-04 04:41:12.918 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:41:12.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:41:12.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:41:12.919 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:41:12.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:41:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:41:12.924 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:41:12.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:41:12.925 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:13.066 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:41:13.092 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:41:13.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:41:13.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:13.094 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:41:13.094 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:41:13.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:13.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:13.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:13.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:41:13.100 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [f7:80:f5:8c:fe:3f:e4:ea:65:87:15:88:54:20:84:78:42:1b:8d:38]
modulus: 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
public exponent: 10001
]
2021-11-04 04:41:45.331 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:41:45.332 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:41:45.333 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-04 04:41:45.333 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:41:45.334 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-04 04:41:45.335 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:41:45.335 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:41:45.338 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:41:45.339 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:41:45.339 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:41:45.392 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:41:45.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:41:45.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:41:45.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:45.492 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:41:45.493 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:41:45.493 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:41:45.493 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:41:45.495 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:41:45.495 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:41:45.495 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.496 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:41:45.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:41:45.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:41:45.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:41:45.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [b6:aa:43:ac:af:a2:44:1f:ea:77:52:9e:b1:6b:e8:68:0d:7a:4c:5d]
modulus: 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
public exponent: 10001
]
2021-11-04 04:42:59.852 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:42:59.853 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:42:59.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-04 04:42:59.854 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:42:59.855 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-04 04:42:59.855 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:42:59.855 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:42:59.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:42:59.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:42:59.856 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:42:59.860 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:42:59.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:42:59.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:42:59.861 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:42:59.961 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:42:59.962 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:42:59.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:42:59.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:42:59.993 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:42:59.993 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:42:59.993 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.994 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.994 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.995 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.995 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.996 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.996 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:42:59.997 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:42:59.997 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:42:59.998 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:43:00.002 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3a:d2:42:b6:87:f9:57:5c:db:2a:27:56:0c:de:8c:7a:4a:d0:3a:99]
modulus: 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
public exponent: 10001
]
2021-11-04 04:43:30.024 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2021-11-04 04:43:30.025 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2021-11-04 04:43:30.026 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:43:30.027 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-04 04:43:30.027 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-04 04:43:30.028 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2021-11-04 04:43:30.028 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2021-11-04 04:43:30.028 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2021-11-04 04:43:30.029 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2021-11-04 04:43:30.029 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2021-11-04 04:43:30.033 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2021-11-04 04:43:30.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:43:30.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2021-11-04 04:43:30.034 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:43:30.164 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2021-11-04 04:43:30.164 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2021-11-04 04:43:30.165 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2021-11-04 04:43:30.165 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2021-11-04 04:43:30.166 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2021-11-04 04:43:30.166 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2021-11-04 04:43:30.167 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.167 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.167 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-04 04:43:30.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2021-11-04 04:43:30.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2021-11-04 04:43:30.171 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-04 04:43:30.173 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 321540723014156983648203595336572206884532340486
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Thu Nov 04 01:23:03 UTC 2021
Final Date: Tue Nov 04 01:23:02 UTC 2031
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [4c:0a:42:f9:16:49:6f:da:10:58:f3:08:c7:42:9e:99:32:af:f5:51]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 1d0abfc0253ecf0e5cd826d9bad866cceb1655ec
a9afc410ab74de9de1017c8892658d125828646c
45d75cf7366c852b8552215352ea2a443003bbf6
4b3ea964f81a7b4ea483a2f6b5e681e71f56f975
fbbe90da1d85eed430dfdb75b87fabf4dbb21896
16904489ce191aa3f758b185eb84c076ff103266
9953743964a7eb0da3bfd9177ecb3926ff2ace1e
281b5eeb40a97426da3ba043850f9c032c78e2d4
247db2335de90dfbbc58eb361954daf4194ecb1b
febac38d37c366f5eebe6b293e940c843f27a292
71ef2f3b563064728189fd5c16f31fb06a175ba0
9858610fcb5ca2f30ccd59cf8ca72d9ebb5fa509
450f2759ceec24071c6d3ed7861b5d93a09da9ee
9022c16534146563091f45040c0860802a9967f2
b2b5b0df3730215f815ae85ffb22b83bd4f19fc7
76d720ce4885ccc260656517f8b17faf8b0a4d41
bc914816ec5f9ca1f4e3c535a2fcee943ef4dac7
5d96301e0d65eaa09201c4ab9a61491d9e25fa4a
0189068faac8cb422650a0545edb51cdc16637c2
b2e25366
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [21:dc:df:b7:36:b9:3b:d6:66:08:63:31:ab:64:b0:8f:20:18:2a:ed]
modulus: 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
public exponent: 10001
]