By type
2022-06-03 02:29:00,834 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-03 02:29:05,138 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.5.8)
2022-06-03 02:29:08.154 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
Jun 03, 2022 2:29:18 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 03, 2022 2:29:18 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 03, 2022 2:29:18 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 03, 2022 2:29:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-03 02:29:20.748 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-03 02:29:21.860 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2022-06-03 02:29:22.558 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-03 02:29:25.832 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReloadConfigController:
{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-03 02:29:25.837 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.CertificationController:
{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-03 02:29:25.839 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReadinessController:
{GET [/ready], produces [application/json]}: checkReady()
2022-06-03 02:29:25.843 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.b.a.w.s.e.BasicErrorController:
{ [/error]}: error(HttpServletRequest)
{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-03 02:29:26.047 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.a.OpenApiResource:
{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-03 02:29:26.050 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.u.SwaggerWelcome:
{GET [/docs]}: redirectToUi(HttpServletRequest)
{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-03 02:29:26.642 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {}
2022-06-03 02:29:32.640 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 03, 2022 2:29:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-03 02:29:37.035 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.812 seconds (JVM running for 47.33)
Jun 03, 2022 2:29:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-03 02:30:21.138 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 02:30:21.146 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 02:30:21.345 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-03 02:30:21.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 02:30:21.357 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-03 02:30:21.359 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 02:30:21.360 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 02:30:21.360 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 02:30:21.361 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 02:30:21.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 02:30:21.438 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 02:30:21.443 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 02:30:21.650 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 02:30:21.735 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 02:30:21.736 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 02:30:21.739 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 02:30:23.278 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 02:30:23.280 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 02:30:23.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 02:30:23.282 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 02:30:23.288 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 02:30:23.289 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 02:30:23.289 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 02:30:23.290 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 02:30:23.290 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 02:30:23.342 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 02:30:23.342 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 02:30:23.343 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 02:30:23.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 02:30:23.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 02:30:23.350 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 02:30:23.351 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 02:30:23.553 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [df:bc:82:68:9e:89:40:2f:15:b7:3c:c1:dc:8d:83:f5:ed:a9:f3:ce]
modulus: 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
public exponent: 10001
]
2022-06-03 03:53:47.948 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 03:53:47.949 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 03:53:47.951 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 03:53:47.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 03:53:47.953 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 03:53:47.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 03:53:47.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 03:53:47.954 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 03:53:47.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 03:53:47.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 03:53:48.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 03:53:48.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 03:53:48.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 03:53:48.043 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 03:53:48.294 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 03:53:48.295 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 03:53:48.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 03:53:48.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 03:53:48.300 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 03:53:48.300 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 03:53:48.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:53:48.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:53:48.302 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:53:48.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:53:48.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:53:48.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:53:48.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:53:48.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:53:48.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:53:48.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 03:53:48.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [a4:a0:9e:50:89:e9:5f:50:f8:22:c0:14:53:90:2b:5a:6c:7f:e2:1e]
modulus: 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
public exponent: 10001
]
2022-06-03 03:57:24.376 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 03:57:24.378 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 03:57:24.380 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 03:57:24.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 03:57:24.382 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 03:57:24.383 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 03:57:24.383 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 03:57:24.383 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 03:57:24.383 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 03:57:24.384 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 03:57:24.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 03:57:24.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 03:57:24.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 03:57:24.392 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 03:57:24.544 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 03:57:24.545 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 03:57:24.545 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 03:57:24.546 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 03:57:24.549 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 03:57:24.549 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 03:57:24.550 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:57:24.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:57:24.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:57:24.552 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:57:24.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:57:24.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:57:24.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 03:57:24.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 03:57:24.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 03:57:24.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 03:57:24.635 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: c0da5949d13bd46d23229e7f8dcae7a3c7360ee35a6eb2d3654d64aee97335ba3e4fb92654f45662c7cda6ded5fba8af94c5366bbe54159dcd320d26ec448e554d390d4bd11d21bc63b2a4693124d4924487a40e1219563a0d69f7be04e181b8fdc38924ab32effbd4bf1aff0b45354c7f022c1a6d692c5c14656b2189d2233f1a2149a3d0027945db4dc043f32fb1109384e5d5bf91cbd33a3de33312b812a5d52d918c8085c9b90e944b07aeca923cf3558d4c5990786dd00e518beaa1692a42c4239da2aaa96a549eadd4c43242fbd0bef57bddf8a613ecca1b67b143da943954cd4f1bd5b8c0a99b1481759a3ea633b7c1c399a12199c40350892a3cf6e09ee60c8a7f3a427862f83eb1c94ec543d0d904fce449504c06bd3d8b23cd1ac55289073ec6946c0e2587c9db0d669d56249e839b98dcf14a623f9dfa60527364d943adf4c1efa1297bf069082b362d59aac41efc63e98a3ad645af2251a7d8767aee8aaddf8f087d8b43691758e9cdcc2db2be73c898b7526e30218a7289948b
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3c:0e:58:0a:1d:21:ee:b5:57:46:5c:35:36:a2:af:e4:4b:61:6f:c4]
modulus: e701ea9b41a4689c6c6d3a25396182ddd69b9b56dd96bd83f8f442eea7997ea3cf786ffae121d9ede5421bd0fc635a35abfe02010a2fd14ed491869db6b4f0c1f8bc822159a10fcb590a59fbffed9e2a66ad96790e583095c76f523a210320b3a172edda9ac3641d0a4831ad5d892524ab5f3e20820679851d2c202ed4f2bb18370a4d681ec4ca402b7eb9abffd0205f79eddaffee9e02bd433c897052dcaf37553105dc0911716fbf1605d4134fd377a81b06e75002de41e9af7b1cc36a08433d080cb7894499dcc8d21caecbc7c0af9ece9244fc44355d7f8c2774491dbe13dba5c17c72dd5a9a4752af6e616bd6e42c01805c115387dae4e76cc13d3614af
public exponent: 10001
]
2022-06-03 04:01:52.568 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:01:52.569 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:01:52.570 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 04:01:52.571 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:01:52.571 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 04:01:52.572 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:01:52.572 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:01:52.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:01:52.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:01:52.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:01:52.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:01:52.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:01:52.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:01:52.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:01:52.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:01:52.734 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:01:52.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:01:52.735 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:01:52.738 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:01:52.739 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:01:52.740 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:01:52.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:01:52.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:01:52.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:01:52.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:01:52.743 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:01:52.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:01:52.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:01:52.746 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:01:52.747 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:01:52.751 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [ca:b9:76:57:5d:23:49:58:32:a2:c5:74:93:34:59:a7:74:cf:f2:9e]
modulus: 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
public exponent: 10001
]
2022-06-03 04:03:41.927 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:03:41.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:03:41.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-03 04:03:41.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:03:41.932 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-03 04:03:41.933 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:03:41.933 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:03:41.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:03:41.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:03:41.934 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:03:41.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:03:41.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:03:41.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:03:41.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:03:42.035 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:03:42.036 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:03:42.036 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:03:42.036 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:03:42.038 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:03:42.039 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:03:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:42.040 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:42.041 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:42.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:42.042 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:42.043 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:42.044 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:42.044 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:42.045 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:03:42.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [92:21:fc:cb:0a:00:a1:6b:c3:51:17:f9:b1:13:72:58:6d:a8:5c:b7]
modulus: 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
public exponent: 10001
]
2022-06-03 04:03:45.899 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:03:45.901 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:03:45.903 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-03 04:03:45.905 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:03:45.905 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-03 04:03:45.906 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:03:45.906 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:03:45.906 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:03:45.906 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:03:45.907 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:03:45.912 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:03:45.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:03:45.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:03:45.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:03:46.011 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:03:46.032 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:03:46.033 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:03:46.034 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:03:46.036 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:03:46.037 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:03:46.037 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:46.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:46.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:46.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:46.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:46.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:46.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:03:46.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:03:46.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:03:46.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:03:46.047 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [1a:65:61:18:27:db:62:89:f1:7a:4f:bd:a1:c9:36:c9:b6:f7:a5:67]
modulus: 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
public exponent: 10001
]
2022-06-03 04:06:18.975 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:06:18.976 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:06:18.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-03 04:06:18.978 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:06:18.978 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-03 04:06:18.978 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:06:18.979 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:06:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:06:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:06:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:06:18.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:06:18.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:06:18.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:06:18.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:06:19.114 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:06:19.115 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:06:19.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:06:19.115 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:06:19.117 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:06:19.118 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:06:19.118 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:06:19.118 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:06:19.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:06:19.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:06:19.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:06:19.120 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:06:19.121 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:06:19.121 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:06:19.121 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:06:19.122 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:06:19.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3a:a9:cc:dc:a1:d0:22:d0:00:32:16:9d:31:87:9d:52:07:b6:7f:2f]
modulus: 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
public exponent: 10001
]
2022-06-03 04:11:01.760 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:11:01.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:11:01.762 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 04:11:01.762 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:11:01.763 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-03 04:11:01.763 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:11:01.763 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:11:01.763 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:11:01.764 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:11:01.764 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:11:01.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:11:01.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:11:01.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:11:01.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:11:01.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:11:01.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:11:01.878 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:11:01.878 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:11:01.879 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:11:01.879 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:11:01.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:11:01.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:11:01.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:11:01.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:11:01.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:11:01.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:11:01.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:11:01.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:11:01.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:11:01.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:11:01.885 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [37:a8:16:c4:a8:20:cf:11:6b:fb:6e:53:8a:45:00:09:ea:5c:8e:b7]
modulus: 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
public exponent: 10001
]
2022-06-03 04:12:52.285 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:12:52.286 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:12:52.288 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-03 04:12:52.288 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:12:52.288 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-03 04:12:52.289 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:12:52.289 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:12:52.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:12:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:12:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:12:52.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:12:52.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:12:52.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:12:52.294 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:12:52.389 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:12:52.389 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:12:52.390 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:12:52.390 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:12:52.391 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:12:52.391 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:12:52.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:12:52.391 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:12:52.392 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:12:52.392 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:12:52.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:12:52.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:12:52.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:12:52.393 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:12:52.394 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:12:52.394 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:12:52.397 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [cd:6b:53:0d:b6:5d:09:55:d2:5b:f7:66:eb:9a:6d:bd:fc:10:44:f2]
modulus: cb9ef591ef2f617cb9cc29d8cde433a61e65ab45a6ac1d0714b5be8995874951f032a9872bc99bbff172f0209ea35a2b61caea48f16a1c09cb77fa14556e15633b5251d44d42b4880c84912261c5e08db024a4b714c052b80a88d41e89a1ffc9e00c77335cade49c44b94dff0987854f0c4ec2d2c4f3597495f9242437efe1c4d89ad24552972de2a593e9234577661d25bb2a9fd1bb1f59cdac7213cc172f68d9f6adbae7ce10030c8ac4a5ae52939a21464fef2c6edd0cb0d6183e1640b6e4e5389f055a6f60e1b26ac177a8d0a1bb37fc6c1d9167ade38ae00b212fb41a412e5815409929430b0a545968b8bd16a1b68b7eeda972194f9142dfa323351b89
public exponent: 10001
]
2022-06-03 04:14:13.962 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-03 04:14:13.964 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-03 04:14:13.967 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-03 04:14:13.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-03 04:14:13.968 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-03 04:14:13.968 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-03 04:14:13.969 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-03 04:14:13.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-03 04:14:13.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-03 04:14:13.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-03 04:14:13.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-03 04:14:13.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:14:13.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-03 04:14:13.976 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:14:14.112 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-03 04:14:14.132 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-03 04:14:14.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-03 04:14:14.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-03 04:14:14.136 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-03 04:14:14.137 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-03 04:14:14.137 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:14:14.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:14:14.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:14:14.139 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:14:14.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:14:14.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:14:14.140 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-03 04:14:14.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-03 04:14:14.141 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-03 04:14:14.142 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-03 04:14:14.145 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 712829248973629835740511744322801834410026870895
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Fri Jun 03 02:23:35 UTC 2022
Final Date: Wed Jun 02 02:23:34 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [1e:93:0a:40:af:5a:f6:3b:9e:c0:04:93:5d:7f:c4:09:61:e8:32:c5]
modulus: c0da5949d13bd46d23229e7f8dcae7a3c7360ee35a6eb2d3654d64aee97335ba3e4fb92654f45662c7cda6ded5fba8af94c5366bbe54159dcd320d26ec448e554d390d4bd11d21bc63b2a4693124d4924487a40e1219563a0d69f7be04e181b8fdc38924ab32effbd4bf1aff0b45354c7f022c1a6d692c5c14656b2189d2233f1a2149a3d0027945db4dc043f32fb1109384e5d5bf91cbd33a3de33312b812a5d52d918c8085c9b90e944b07aeca923cf3558d4c5990786dd00e518beaa1692a42c4239da2aaa96a549eadd4c43242fbd0bef57bddf8a613ecca1b67b143da943954cd4f1bd5b8c0a99b1481759a3ea633b7c1c399a12199c40350892a3cf6e09ee60c8a7f3a427862f83eb1c94ec543d0d904fce449504c06bd3d8b23cd1ac55289073ec6946c0e2587c9db0d669d56249e839b98dcf14a623f9dfa60527364d943adf4c1efa1297bf069082b362d59aac41efc63e98a3ad645af2251a7d8767aee8aaddf8f087d8b43691758e9cdcc2db2be73c898b7526e30218a7289948b
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: aee9e929a3a78ba3d761cba457d40b952694d205
aa4b5e6f223364f7d08f49bb908792b3d8fd0f16
56d57678be406bb4ba3c593899b0ac8086e9deb5
c301ff52841da4171edd07259a92b03336c2268d
2da8905bdef2de8b6898c42faac54d210f467fab
6838518fd14b2173dec429d195b0a467f1a387df
a5112143696ba948d418e246f65d1e797f5ab39b
0b38025257cc70c516f7a330dceadf129da258b3
56608a31203ba3129bb41387a7afe8036b99703e
39588e2e8eed73f23a3cc291922e412562b72cea
235952e72c1fd415860aff289699d632f859fef4
7211b7a2d98567e4cf633ca65354824e5e52d5ba
b929784cce337c1af34180068b612b1bcf58b45c
1d3d2cdeefc65945bff8086cc8073dfcbfbe9380
209a81164ef8feb42905b554ccc0a0870e4e8bdd
d68a336c4ea7fb13ce3f0ef0f9923a9a7566e86e
166682bcb469ee1bf3a4bd071a6e1cb38a89c671
66db6c15560904d19ae66fcc5072b54abcefb829
541b97c2ad05c20f09ec539de3a21d0f81f7658a
eac7ae20
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [da:a8:7c:b9:27:ec:91:46:98:28:c4:ac:c6:31:cc:24:93:75:e7:88]
modulus: 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
public exponent: 10001
]