By type
2022-06-05 01:41:02,916 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-05 01:41:07,522 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.5.8)
2022-06-05 01:41:10.801 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default
Jun 05, 2022 1:41:21 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 05, 2022 1:41:21 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 05, 2022 1:41:21 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 05, 2022 1:41:21 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-05 01:41:23.601 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-05 01:41:25.122 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration
2022-06-05 01:41:25.821 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-05 01:41:29.317 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReloadConfigController:
{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-05 01:41:29.320 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.CertificationController:
{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-05 01:41:29.321 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.o.o.c.a.ReadinessController:
{GET [/ready], produces [application/json]}: checkReady()
2022-06-05 01:41:29.324 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.b.a.w.s.e.BasicErrorController:
{ [/error]}: error(HttpServletRequest)
{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-05 01:41:29.605 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.a.OpenApiResource:
{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-06-05 01:41:29.609 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m :
o.s.u.SwaggerWelcome:
{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-05 01:41:30.119 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {}
2022-06-05 01:41:35.608 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 05, 2022 1:41:39 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-05 01:41:40.505 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 41.286 seconds (JVM running for 49.879)
Jun 05, 2022 1:41:43 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-05 01:42:25.003 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 01:42:25.012 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 01:42:25.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-05 01:42:25.129 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 01:42:25.304 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-05 01:42:25.307 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 01:42:25.308 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 01:42:25.310 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 01:42:25.311 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 01:42:25.314 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 01:42:25.318 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 01:42:25.321 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 01:42:25.512 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 01:42:25.517 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 01:42:25.517 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 01:42:25.520 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 01:42:26.852 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 01:42:26.854 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 01:42:26.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 01:42:26.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 01:42:26.862 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 01:42:26.863 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 01:42:26.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 01:42:26.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 01:42:26.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 01:42:26.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 01:42:26.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 01:42:26.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 01:42:26.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 01:42:26.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 01:42:26.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 01:42:26.912 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 01:42:27.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [35:54:d7:d6:a8:20:9f:e0:8b:72:34:fc:1c:b2:cd:0a:0a:71:57:41]
modulus: aad55889b5b6ba6cacffafe025b3227538c8cc0a27ae43cf44f322c0d9747221910087cad96c9998bde942f9de65e05334f52b6f186b6dad179f38e6ec8cf8d3e500cb7c3d115d638485a0d7d37083a4bc86ac0c975d18800cae20c443bdde39e804cd2710dc6ff789f9b5eb7a1b46fc5474bdf73d0f1f0e68e30ab8416c6a05a420c9bc40d531ff0c5fbc98b9d5af2883e82e9aaf76fea18fcd995a342bd157ac43a3a96d4bdbab3d6ef068b2b061bda7f762e1742ba974691ce0695343144203d5501c83acdb49531b4445d25b6f05a70c45ea01b6428e6f7cc668fc193cdfb66b4796c47ba40aa396f2a725f3f28c5f139b435737a8b9e07140abf27e74e3
public exponent: 10001
]
2022-06-05 03:07:49.814 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:07:49.816 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:07:49.818 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:07:49.819 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:07:49.820 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:07:49.821 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:07:49.821 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:07:49.821 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:07:49.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:07:49.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:07:49.829 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:07:49.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:07:49.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:07:49.902 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:07:50.143 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:07:50.144 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:07:50.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:07:50.145 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:07:50.200 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:07:50.201 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:07:50.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:07:50.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:07:50.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:07:50.205 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:07:50.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:07:50.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:07:50.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:07:50.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:07:50.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:07:50.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:07:50.213 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3e:53:c8:6f:e7:25:77:ee:63:b1:db:6a:a7:4d:8b:33:2d:03:dd:35]
modulus: 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
public exponent: 10001
]
2022-06-05 03:11:46.164 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:11:46.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:11:46.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:11:46.169 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:11:46.169 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:11:46.170 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:11:46.171 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:11:46.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:11:46.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:11:46.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:11:46.178 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:11:46.178 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:11:46.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:11:46.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:11:46.310 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:11:46.311 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:11:46.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:11:46.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:11:46.319 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:11:46.320 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:11:46.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:11:46.321 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:11:46.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:11:46.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:11:46.323 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:11:46.323 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:11:46.324 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:11:46.325 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:11:46.325 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:11:46.401 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:11:46.404 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [5d:65:ab:13:1b:75:6d:5b:42:ef:25:a8:b0:84:54:f2:c6:64:ac:17]
modulus: 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
public exponent: 10001
]
2022-06-05 03:15:11.575 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:15:11.576 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:15:11.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:15:11.577 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:15:11.578 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:15:11.579 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:15:11.579 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:15:11.579 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:15:11.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:15:11.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:15:11.590 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:15:11.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:15:11.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:15:11.591 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:15:11.733 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:15:11.734 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:15:11.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:15:11.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:15:11.736 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:15:11.736 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:15:11.736 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:15:11.737 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:15:11.737 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:15:11.738 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:15:11.738 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:15:11.738 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:15:11.739 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:15:11.739 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:15:11.740 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:15:11.740 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:15:11.743 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [0b:49:33:e9:c7:c8:f9:5d:47:3d:61:cc:92:26:1b:29:6f:cb:56:5c]
modulus: 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
public exponent: 10001
]
2022-06-05 03:19:04.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:19:04.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:19:04.726 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:19:04.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:19:04.728 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:19:04.729 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:19:04.729 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:19:04.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:19:04.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:19:04.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:19:04.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:19:04.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:19:04.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:19:04.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:19:04.908 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:19:04.909 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:19:04.909 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:19:04.910 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:19:04.912 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:19:04.913 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:19:04.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:19:04.914 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:19:04.914 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:19:04.915 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:19:04.915 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:19:04.915 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:19:04.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:19:04.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:19:04.916 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:19:04.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:19:04.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [3d:f2:18:a9:73:27:a9:6d:43:79:48:d2:5b:e9:76:f4:ee:cf:e6:d5]
modulus: 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
public exponent: 10001
]
2022-06-05 03:20:32.713 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:20:32.714 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:20:32.716 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-05 03:20:32.717 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:20:32.717 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-05 03:20:32.718 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:20:32.718 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:20:32.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:20:32.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:20:32.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:20:32.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:20:32.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:20:32.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:20:32.725 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:20:32.829 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:20:32.830 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:20:32.830 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:20:32.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:20:32.833 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:20:32.833 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:20:32.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:20:32.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:20:32.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:20:32.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:20:32.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:20:32.837 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:20:32.900 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:20:32.901 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:20:32.902 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:20:32.904 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:20:32.906 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: c1c8dd46676fa94b3a6e82c29bb7fd42529a4fa9be5edd90e32633d9dc8b42faf4140230a3e6694d11f27eaaf321ca1eb9b101de8960eb73006fed3008ca5c6d66747d61f38fb11f79096e8d15082cb9f402ed7c5aa82145b8865a6e48af00290f39fb1b27f199762e3eb187a3b3cf0e6d002093e3b0a4ea59566402e9bda1e3b95ab179ca1f4c306cd0a5c2a8ea8145b2e94930e5afe6bc9419a0a05f1eceefd32177c987ea26934ac5f157dc91d0403a5bd2443078bd89fb95b83226916c2b98cd21f2928e601d5ecf4fcfb843f3c7763871e1116d6509c08260cfc76ba00ba87e30c7d0efac528fa560fb9f29d6004af54b5687bbcfc0fc0a988d63c804c5ad009c1ea18fa4d511b25f4a91788659d063d331c92919e5382b659634cad1a4c6599cafee9c51cb20a7cf2b38b4d19f1dc7ec91a23c2faee96fbc832f3061c4ecbd7b3c58a2e394cb84d9e7d8c51584e236c7257c56daea7fdd135d762e701b466ab102deaaae61bd1eece68efa45527c2be14488507529f8a952008015c611
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [6c:99:31:8e:d8:06:25:33:71:4e:6e:f1:ee:25:44:8d:19:5a:e8:a4]
modulus: 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
public exponent: 10001
]
2022-06-05 03:23:15.180 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:23:15.181 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:23:15.182 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-05 03:23:15.183 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:23:15.183 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-05 03:23:15.184 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:23:15.184 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:23:15.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:23:15.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:23:15.185 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:23:15.191 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:23:15.192 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:23:15.192 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:23:15.192 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:23:15.286 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:23:15.286 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:23:15.287 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:23:15.287 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:23:15.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:23:15.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:23:15.291 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:23:15.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:23:15.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:23:15.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:23:15.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:23:15.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:23:15.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:23:15.295 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:23:15.295 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:23:15.296 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:23:15.299 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [c2:1e:bb:51:25:3d:3a:73:b0:1d:22:41:54:36:fc:96:14:72:ab:0f]
modulus: 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
public exponent: 10001
]
2022-06-05 03:26:45.315 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:26:45.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:26:45.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:26:45.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:26:45.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-05 03:26:45.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:26:45.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:26:45.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:26:45.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:26:45.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:26:45.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:26:45.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:26:45.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:26:45.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:26:45.421 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:26:45.422 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:26:45.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:26:45.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:26:45.424 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:26:45.424 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:26:45.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:26:45.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:26:45.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:26:45.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:26:45.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:26:45.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:26:45.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:26:45.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:26:45.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:26:45.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:26:45.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [8e:e9:13:5a:eb:0d:5d:cb:08:cb:f1:8b:4c:14:b4:f0:7e:c8:a5:08]
modulus: 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
public exponent: 10001
]
2022-06-05 03:33:57.869 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:33:57.871 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:33:57.874 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-05 03:33:57.875 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:33:57.876 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-05 03:33:57.876 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:33:57.877 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:33:57.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:33:57.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:33:57.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:33:57.882 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:33:57.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:33:57.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:33:57.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:33:57.985 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:33:57.985 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:33:58.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:33:58.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:33:58.002 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:33:58.002 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:33:58.002 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:33:58.003 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:33:58.003 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:33:58.003 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:33:58.003 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:33:58.004 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:33:58.004 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:33:58.005 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:33:58.005 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:33:58.005 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:33:58.008 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [b7:e6:3b:29:4e:ba:55:10:0b:49:cc:75:42:7a:0b:8c:07:65:82:5f]
modulus: edfb0ab58e3f582800ff986a284a7a32d04c9f83aef94eeab2b0573f50c8c1b04af052e05db3520aee18861b91b5f2f09589db59d25b227b699e44c8a26ef6337bc9b279c7fa8c92ace8fd1b85a6ae55abe954cc6ce72a04b82f8ef3432136ffb2de1f92eac270bfc708c33c4da0d04b93c6b3dbedd7518ca12923e78571f8a0abf2fad0a5f957792a3367591371e3be9d5c9cb44bbb33b3f9a29566395e3cfb974037cfa2770adf5c9a01919b4ecca8e58777c69e9c1068346a32fdf7eb5d92dff484558b1b7f3babccc97ba387280dab105f834199d699a01432e5ee381a1353e9124d28802d00d54fe6edcdac89c0abbd76eb4920049def34f9538e8202a7
public exponent: 10001
]
2022-06-05 03:42:12.089 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:42:12.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:42:12.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-05 03:42:12.094 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:42:12.094 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-05 03:42:12.094 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:42:12.095 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:42:12.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:42:12.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:42:12.096 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:42:12.100 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:42:12.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:42:12.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:42:12.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:42:12.199 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:42:12.199 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:42:12.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:42:12.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:42:12.201 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:42:12.201 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:42:12.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:42:12.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:42:12.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:42:12.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:42:12.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:42:12.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:42:12.203 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:42:12.203 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:42:12.203 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:42:12.204 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:42:12.207 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [84:16:7b:c7:84:a4:fc:4d:16:87:8d:7a:67:5b:74:5d:df:8c:77:00]
modulus: 957e2de67a131066e6a957bc0ced43d146574a04449e01ed0324a53399933e24542b1fd89e48e082cbb44cf28bcf0bda7ad71ca4d8dda94600d579cf36ce7a28cbf59cc14108fa8d31da05accccba55a4cb442e0eec0fd1504adb0261db1782f64899239f60c36341b7b80366947bb319c772742857c677256c9fe8fa178b34b5c5f3ede0896919675ecd8a08e0271577ff1fd260a08b0a267e38ecea3c1df4734e7b87d795ee37ea3b87a9af43af5e1a4170b59fd4aa7a6e7fa52d8cb39acec171cdc48f920a68f4a4b2901aaa730edc5b1d2cb0a794bed3cb6cb7fbb479261e7bb1b4548d81dafa28d9355ce13efcf24805e1ae048e949305eccb434210e95
public exponent: 10001
]
2022-06-05 03:43:32.533 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA
2022-06-05 03:43:32.534 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object
2022-06-05 03:43:32.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-05 03:43:32.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name:
Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-05 03:43:32.536 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-05 03:43:32.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA
2022-06-05 03:43:32.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully.
2022-06-05 03:43:32.537 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer
2022-06-05 03:43:32.537 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names
2022-06-05 03:43:32.538 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects
2022-06-05 03:43:32.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder
2022-06-05 03:43:32.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:43:32.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes
2022-06-05 03:43:32.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:43:32.632 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server
2022-06-05 03:43:32.633 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP
2022-06-05 03:43:32.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response.
2022-06-05 03:43:32.633 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody
2022-06-05 03:43:32.635 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0
2022-06-05 03:43:32.635 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse.
2022-06-05 03:43:32.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:43:32.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:43:32.636 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:43:32.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:43:32.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:43:32.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:43:32.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-05 03:43:32.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC
2022-06-05 03:43:32.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC
2022-06-05 03:43:32.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-05 03:43:32.643 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [
Trust Anchor: [
Trusted CA cert: [0] Version: 3
SerialNumber: 216073695477044119828229795847420316163290552642
IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Start Date: Sun Jun 05 01:37:41 UTC 2022
Final Date: Fri Jun 04 01:37:40 UTC 2032
SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
Public Key: RSA Public Key [a8:c7:96:1c:8a:f7:0a:35:fe:31:68:e2:2c:44:7c:1f:e8:27:b8:37]
modulus: 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
public exponent: 10001
Signature Algorithm: SHA256WITHRSA
Signature: 73171b965d05cefffe311f80646ad86daf24d820
5f70b2d756e0aa9c67cf33f88f9a94ecee2912c8
e5daca86c4c5b081a4599354dd56584a3f1cf979
e9cd6e3ac088747711ee85a2fe1c0b5d82e1e9ee
d00232f167d01ac6aebe5ad32ea1b61862a5d806
bb028c0343b1a8970bf143eea34eaf5986fecff4
6a6bfd3f03b96314332b17dd01d2d9de06ebdbd3
889f65d93fc59f2d9c87f88fbab0279d5da9a7fa
e2f067b982242a8d304c09e730eeaa69b8f4adf8
c906dc8a8ba885ce202e7cdfcc3a7fa0de311fd8
a0fc18e269572b08cb444c782b5aae6f59a10ca4
d7addaad9e3439b4bcc03c8b93ce98bbacdd73ab
3691a2920bc466a7f3522e13670702a38f49bc50
2d518d258276ebf598b42c4dac1cbe8355982547
2dbaaa520933672367b7f4d2bd15b0e651ad74b6
eab389dee517e17e2d4fb149e3453af7ff221e24
c81b27c35e77f7865eab9b64beb3e70513ccc23b
b558416a5cffe4324a099a31a34a0a1e69cb168c
27bb35558d13a120551847c5e1fa91d381804f0a
b6de3726
Extensions:
critical(true) BasicConstraints: isCa(true)
critical(false) 2.5.29.35 value = Sequence
Tagged [0] IMPLICIT
DER Octet String[20]
critical(false) 2.5.29.14 value = DER Octet String[20]
critical(true) KeyUsage: 0x86
Policy Tree: null
Subject Public Key: RSA Public Key [34:10:5e:7e:f3:a0:c5:c2:e5:96:c8:0b:26:40:11:a2:ae:c3:51:ab]
modulus: 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
public exponent: 10001
]