By type
2022-04-04 01:02:48,672 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-04 01:02:52,769 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.5.8)
2022-04-04 01:02:55.572 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
Apr 04, 2022 1:03:05 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 04, 2022 1:03:05 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 04, 2022 1:03:05 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 04, 2022 1:03:05 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-04 01:03:07.482 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-04 01:03:08.686 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2022-04-04 01:03:09.371 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-04 01:03:12.166 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReloadConfigController:
{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-04 01:03:12.169 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.CertificationController:
{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-04 01:03:12.170 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReadinessController:
{GET [/ready], produces [application/json]}: checkReady()
2022-04-04 01:03:12.172 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.b.a.w.s.e.BasicErrorController:
{ [/error]}: error(HttpServletRequest)
{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-04 01:03:12.362 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.a.OpenApiResource:
{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-04 01:03:12.367 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.u.SwaggerWelcome:
{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-04 01:03:12.865 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {}
2022-04-04 01:03:18.267 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 04, 2022 1:03:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-04 01:03:22.661 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 37.615 seconds (JVM running for 45.267)
Apr 04, 2022 1:03:25 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-04 01:04:04.568 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 01:04:04.574 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 01:04:05.175 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-04 01:04:05.178 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 01:04:05.270 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-04 01:04:05.273 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 01:04:05.273 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 01:04:05.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 01:04:05.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 01:04:05.366 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 01:04:05.374 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 01:04:05.378 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 01:04:05.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 01:04:05.575 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 01:04:05.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 01:04:05.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 01:04:06.815 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 01:04:06.817 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 01:04:06.817 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 01:04:06.818 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 01:04:06.863 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 01:04:06.865 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 01:04:06.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 01:04:06.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 01:04:06.867 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 01:04:06.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 01:04:06.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 01:04:06.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 01:04:06.979 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 01:04:06.979 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 01:04:06.979 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 01:04:06.981 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 01:04:07.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [f5:55:19:c8:fb:60:7b:f0:a1:c0:aa:04:21:09:c1:a7:0e:e2:ea:c4]
modulus: 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
public exponent: 10001
]
2022-04-04 03:38:00.124 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:38:00.126 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:38:00.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-04 03:38:00.130 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:38:00.132 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-04 03:38:00.132 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:38:00.133 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:38:00.133 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:38:00.133 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:38:00.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:38:00.162 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:38:00.163 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:38:00.163 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:38:00.163 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:38:00.296 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 03:38:00.297 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 03:38:00.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 03:38:00.298 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:38:00.364 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 03:38:00.365 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 03:38:00.365 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:38:00.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:38:00.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:38:00.368 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:38:00.368 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:38:00.368 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:38:00.369 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:38:00.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:38:00.370 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:38:00.372 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 03:38:00.375 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [f1:7e:3a:00:86:50:1d:49:79:8c:37:d9:68:1e:e9:03:ec:55:d3:88]
modulus: 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
public exponent: 10001
]
2022-04-04 03:45:04.693 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:45:04.694 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:45:04.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 03:45:04.697 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:45:04.697 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 03:45:04.698 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:45:04.698 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:45:04.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:45:04.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:45:04.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:45:04.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:45:04.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:45:04.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:45:04.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:45:04.833 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server
java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered
at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source)
at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.base/java.lang.Thread.run(Unknown Source)
2022-04-04 03:45:04.874 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client:
org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.base/java.lang.Thread.run(Unknown Source)
Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered
at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source)
at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171)
... 61 more
2022-04-04 03:53:39.550 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:53:39.551 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:53:39.553 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:53:39.554 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:53:39.554 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:53:39.555 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:53:39.555 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:53:39.555 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:53:39.556 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:53:39.556 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:53:39.569 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:53:39.569 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:53:39.569 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:53:39.570 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:53:40.694 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.Cmpv2HttpClient [m : IOException error Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused), while trying to connect CA RA
2022-04-04 03:53:40.696 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client:
org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused)
at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:137)
at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$c63af2b8.execute()
at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
... 62 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
at java.base/java.net.Socket.connect(Unknown Source)
at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
... 83 more
2022-04-04 03:55:59.603 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:55:59.604 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:55:59.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 03:55:59.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:55:59.607 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 03:55:59.607 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:55:59.608 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:55:59.608 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:55:59.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:55:59.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:55:59.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:55:59.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:55:59.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:55:59.662 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:56:00.690 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.Cmpv2HttpClient [m : IOException error Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused), while trying to connect CA RA
2022-04-04 03:56:00.691 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client:
org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89)
at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95)
at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58)
at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77)
at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067)
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused)
at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:137)
at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$c63af2b8.execute()
at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
... 62 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
at java.base/java.net.Socket.connect(Unknown Source)
at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
... 83 more
2022-04-04 03:56:22.880 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:56:22.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:56:22.883 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:56:22.884 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:56:22.885 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:56:22.886 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:56:22.887 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:56:22.887 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:56:22.887 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:56:22.888 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:56:22.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:56:22.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:56:22.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:56:22.893 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:56:23.194 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 03:56:23.195 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 03:56:23.196 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 03:56:23.196 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:56:23.198 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 03:56:23.199 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 03:56:23.200 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:56:23.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:56:23.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:56:23.202 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:56:23.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:56:23.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:56:23.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:56:23.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:56:23.206 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:56:23.206 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 03:56:23.208 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [55:5c:17:b6:84:99:2e:0f:b5:46:6b:10:49:7c:74:61:60:94:39:1b]
modulus: f65d77ad2c8b15e83b2cb98db01132064690974419315ac083c6e45df996644b21471abfe4d840e56e8b97c7ca414cd12acec3bafabf3c352ab255c93e302e2ee5f98362ab78f50135052aeccd80d2961853a4587eea3a04b19ee10b7648de700d220efcb27f86adff672996a704e4500db85b427f16e7ef59656f8cf0effa75908c1cc44423d92554ec5a1433eaa59509d8b1b53f6744b29e9d4914aaef45db99cdd53e81614e9483a96d4bc41cd6e6a40b93063135b7eacecb5ba6c56b864647f0cc7ce74c5c14c54017514ee8fd07fc84973ef395c03c1e29254f7abdfddca8f8adc21afc7ca317f0a4a6149555a679798dae4f8038c5272643549136ae61
public exponent: 10001
]
2022-04-04 03:59:48.089 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 03:59:48.090 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 03:59:48.091 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:59:48.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 03:59:48.093 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 03:59:48.094 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 03:59:48.094 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 03:59:48.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 03:59:48.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 03:59:48.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 03:59:48.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 03:59:48.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:59:48.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 03:59:48.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:59:48.264 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 03:59:48.265 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 03:59:48.265 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 03:59:48.265 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 03:59:48.267 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 03:59:48.268 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 03:59:48.268 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:59:48.268 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:59:48.269 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:59:48.269 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:59:48.270 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:59:48.270 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:59:48.270 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 03:59:48.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 03:59:48.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 03:59:48.272 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 03:59:48.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 80f96804a1903556e1b3ef0493bd6cd64b872b23c4f096743dfb8091fb4b8443e9b06c44169a1b06cbb08e445fd2162af72547fcc4d5c8a616e63c2758f3a76f492a30c4a34edf4a4c740049890c63f703e6c98d5b8472f8f5ae0bc4ffc0734929730c3509aa9680c4d754850af062cc59c7ece8e50faf62e4d8ddf9d4616b47df4e25441c2681abcc14046cdb4152e1dcdd34a2646127c9e5ee7a257e48d5ae239596db2aa316b41e6086d53f20ff3f0a984d43b9855c4756b43dd6c124f442d00b55cdd092a18c74d135176e039257783dc7d6085402cc3ae1c493f67d595e9e7f97a072dc6bc9144585edec2a5a4e3960a8bb98bf715d868ac0b883c5bb2f641d2769532fa841e2753b849f386341534253d3964e01c5b15efd2f8b4a05fdcf3e5e30daf92d6688388d13cb918106bb45c85e0674fa84e3771c3c70f7ec488669bfad5894903aefdae8ff7d1cd0d44629484f2cc1ca637d9853c3196dd26c1e8d30eba20a354e4f0261c56341849e3d2f967ecc793717fcd1c91c08af27df
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [96:f2:8a:d6:dc:56:90:c5:5a:98:81:8a:d9:f0:1a:6a:0d:0c:c2:e3]
modulus: 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
public exponent: 10001
]
2022-04-04 04:01:48.314 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:01:48.316 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:01:48.318 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-04 04:01:48.318 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:01:48.319 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-04 04:01:48.319 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:01:48.320 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:01:48.320 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:01:48.320 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:01:48.321 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:01:48.325 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:01:48.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:01:48.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:01:48.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:01:48.444 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:01:48.445 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:01:48.445 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:01:48.445 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:01:48.447 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:01:48.448 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:01:48.448 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:01:48.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:01:48.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:01:48.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:01:48.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:01:48.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:01:48.451 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:01:48.451 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:01:48.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:01:48.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:01:48.455 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [69:6d:7e:1e:21:c0:58:5c:15:3c:60:b6:93:3b:e3:cd:fb:7e:f2:77]
modulus: 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
public exponent: 10001
]
2022-04-04 04:04:14.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:04:14.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:04:14.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-04 04:04:14.894 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:04:14.894 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-04 04:04:14.895 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:04:14.895 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:04:14.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:04:14.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:04:14.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:04:14.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:04:14.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:04:14.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:04:14.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:04:15.043 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:04:15.044 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:04:15.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:04:15.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:04:15.046 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:04:15.047 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:04:15.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:04:15.048 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:04:15.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:04:15.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:04:15.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:04:15.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:04:15.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:04:15.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:04:15.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:04:15.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:04:15.069 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [2c:45:00:37:02:97:c7:5f:d9:d1:ab:ba:81:74:68:73:97:a1:61:1d]
modulus: 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
public exponent: 10001
]
2022-04-04 04:06:44.610 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:06:44.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:06:44.612 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 04:06:44.612 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:06:44.612 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-04 04:06:44.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:06:44.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:06:44.613 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:06:44.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:06:44.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:06:44.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:06:44.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:06:44.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:06:44.623 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:06:44.709 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:06:44.710 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:06:44.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:06:44.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:06:44.712 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:06:44.762 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:06:44.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:06:44.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:06:44.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:06:44.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:06:44.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:06:44.766 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:06:44.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:06:44.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:06:44.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:06:44.771 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:06:44.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [de:96:0a:77:fd:94:48:65:fc:ea:89:d6:ac:df:f9:60:86:8b:df:d6]
modulus: c270809bbea149c6c20071990ecab942e5dfe7796aea5b7931f15ffa821a605f9fe44465e7ae80ead2b65b60d576e83e3cc209234cbbc25dc1197e42106e9338076926c25f268b6e548eb941b287da70f9f370532117c96c429e2622702c97999955c8c2617d084f6a9629bc4b0ea90395e9664de05b9eec86438b8563248cee8b591d91165eb3f1cceae0c2492a2275f1f30b66d94abff382109385597676f0f0b81e0b81bc9831ed030d487aa482a2ccef3c25fe69b9a3441af5a08dc3ec857bad4308b48ca7bbc6354a52063677056a06b054d2a81c73d0c0d98d5b1726e8b139021f0dad3f41833b93053b4f49517c5f77ffd852b95df9dfdd8cae5d6501
public exponent: 10001
]
2022-04-04 04:07:48.972 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:07:48.974 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:07:48.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:07:48.977 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:07:48.978 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:07:48.979 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:07:48.979 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:07:48.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:07:48.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:07:48.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:07:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:07:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:07:48.985 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:07:48.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:07:49.072 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:07:49.073 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:07:49.073 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:07:49.074 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:07:49.076 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:07:49.076 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:07:49.077 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:49.077 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:49.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:49.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:49.078 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:49.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:49.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:49.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:49.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:49.080 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:07:49.083 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [38:77:c2:4b:f4:c1:3c:80:04:40:24:93:3e:00:ee:3b:89:17:ab:56]
modulus: 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
public exponent: 10001
]
2022-04-04 04:07:52.337 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:07:52.338 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:07:52.339 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-04 04:07:52.339 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:07:52.339 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-04 04:07:52.340 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:07:52.340 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:07:52.340 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:07:52.340 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:07:52.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:07:52.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:07:52.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:07:52.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:07:52.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:07:52.418 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:07:52.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:07:52.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:07:52.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:07:52.421 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:07:52.421 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:07:52.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:52.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:52.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:52.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:52.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:52.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:07:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:07:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:07:52.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:07:52.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [1f:81:c8:00:2f:b1:63:b8:e1:86:cc:7e:87:30:a0:cf:b7:27:54:4f]
modulus: da2938ff12a102158e1a3e487bd5a2c2b4b4b60ed42b16eb34aae5c6671961adbb379fdbb868243f60f84a1ca109c5171fed2c33f5ea35fd6cb0fce2991c47874bb820b3f4c6389578dd94a1fd9d2a517b5daf9218c987b9a6c14abafa706cbad789775fc11a2250a51476918889b81682627202dd0c17f63d396623cb126dc27c1dfc5225707cf5f78db3b8b23fc7ce7e112d829c6c0ed171e8ed1ea12089cbb4ab1e2c6228b2b95f1861effb13d9972dc785dc28201a96cfdb443f155d3e03df1efafe69c169b215fda8bfb1e51eaffc702be85e24c47d15a17bc6d319e87b466fb046a9b7be80a11956b0b07a0091564fa64095b9937f801102b890a54c81
public exponent: 10001
]
2022-04-04 04:11:20.775 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:11:20.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:11:20.778 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:11:20.779 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:11:20.779 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:11:20.780 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:11:20.780 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:11:20.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:11:20.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:11:20.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:11:20.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:11:20.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:11:20.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:11:20.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:11:20.867 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:11:20.868 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:11:20.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:11:20.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:11:20.870 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:11:20.871 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:11:20.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:11:20.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:11:20.872 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:11:20.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:11:20.878 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:11:20.878 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:11:20.880 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:11:20.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:11:20.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:11:20.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:11:20.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [4b:b7:89:40:10:ff:50:9c:d2:89:3a:f1:0b:a3:c2:8b:06:cb:e4:c9]
modulus: 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
public exponent: 10001
]
2022-04-04 04:16:46.240 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:16:46.242 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:16:46.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:16:46.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:16:46.243 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:16:46.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:16:46.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:16:46.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:16:46.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:16:46.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:16:46.249 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:16:46.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:16:46.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:16:46.250 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:16:46.329 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:16:46.330 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:16:46.330 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:16:46.331 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:16:46.332 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:16:46.333 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:16:46.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:16:46.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:16:46.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:16:46.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:16:46.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:16:46.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:16:46.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:16:46.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:16:46.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:16:46.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:16:46.339 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [a1:b8:d5:a2:32:c4:20:3d:f5:c5:06:46:60:9d:01:bf:1f:69:47:b0]
modulus: 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
public exponent: 10001
]
2022-04-04 04:21:28.805 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-04-04 04:21:28.806 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-04-04 04:21:28.808 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:21:28.809 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 04:21:28.809 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 04:21:28.810 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-04-04 04:21:28.810 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-04-04 04:21:28.810 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-04-04 04:21:28.810 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-04-04 04:21:28.811 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-04-04 04:21:28.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-04-04 04:21:28.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:21:28.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-04-04 04:21:28.815 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:21:28.899 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-04-04 04:21:28.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-04-04 04:21:28.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-04-04 04:21:28.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 04:21:28.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-04-04 04:21:28.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-04-04 04:21:28.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:21:28.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:21:28.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:21:28.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:21:28.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:21:28.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:21:28.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 04:21:28.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-04-04 04:21:28.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-04-04 04:21:28.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 04:21:28.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 461088822557063581368180181096244130117031333399
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Mon Apr 04 00:59:00 UTC 2022
Final Date: Sat Apr 03 00:58:59 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 10d26549027e617e8b4405d881fc4379dcf6d156
d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6
f0e40f1684cf5e97d228f4e4e0a684f02dc50984
87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb
e6ff301d105b694689452d66dbf3d2741ef8da49
cfac3c73e1eea1bae5b733c9c55f7361538d97a2
935d4e424fa0c7fc855342f8c085c53c9701e7df
def9134d9dc4998b88414c4a788fca48ac90674a
19f77aba5fadf7d22212af71f2c9070af07eaa62
bca308aac223ea83ea4b1e90b9714b848254bacb
f729b782b3c738050f1de37271936ab05d36696e
f905b2d24cfe68f34626c70f002f02c5458f1227
a3369a78977d2638f209ce4243bbef7d3510a70f
85df8460c7b2c75dfd50530d7fee0193cbc3d253
75ff642b36c882ee065ccac63c00161acb2e99f5
e5fce3e544f92c8b66c1c455f8d7c2e1767ac180
7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f
3e4a961ec2eb3fefcca43dce037f9e6d112cac54
7f2512e361a07889604c18fcd2acd6886a820bdc
46b3ea94
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [b6:22:d4:b7:a3:f9:96:09:21:1d:7f:a0:73:4d:ab:9e:97:a7:9d:b8]
modulus: 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
public exponent: 10001
]