By type
2022-03-08 10:34:25,535 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-08 10:34:26,465 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-08 10:34:27.258 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 08, 2022 10:34:29 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 08, 2022 10:34:29 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 08, 2022 10:34:29 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 08, 2022 10:34:29 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-08 10:34:29.731 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-08 10:34:30.010 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-08 10:34:30.170 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-08 10:34:30.840 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-08 10:34:30.843 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-08 10:34:30.844 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-08 10:34:30.848 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-08 10:34:30.886 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-08 10:34:30.889 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-08 10:34:31.017 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-08 10:34:31.657 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 08, 2022 10:34:32 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-08 10:34:32.586 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.829 seconds (JVM running for 9.778) Mar 08, 2022 10:35:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-08 10:35:16.664 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 10:35:16.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 10:35:16.719 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-08 10:35:16.723 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 10:35:16.743 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-08 10:35:16.745 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 10:35:16.746 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 10:35:16.748 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 10:35:16.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 10:35:16.754 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 10:35:16.759 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 10:35:16.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 10:35:16.812 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 10:35:16.817 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 10:35:16.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 10:35:16.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 10:35:17.502 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 10:35:17.505 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 10:35:17.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 10:35:17.508 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 10:35:17.518 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 10:35:17.519 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 10:35:17.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 10:35:17.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 10:35:17.520 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 10:35:17.532 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 10:35:17.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 10:35:17.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 10:35:17.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 10:35:17.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 10:35:17.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 10:35:17.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 10:35:17.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:cf:1f:5c:ba:c1:34:e7:41:ca:89:50:e3:f5:67:90:ad:7e:ce:51] modulus: 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 public exponent: 10001 ] 2022-03-08 12:34:03.023 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:34:03.029 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:34:03.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 12:34:03.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:34:03.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 12:34:03.040 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:34:03.042 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:34:03.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:34:03.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:34:03.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:34:03.051 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:34:03.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:34:03.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:34:03.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:34:03.256 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:34:03.257 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:34:03.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:34:03.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:34:03.261 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:34:03.262 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:34:03.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:03.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:03.264 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:03.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:03.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:03.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:03.266 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:03.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:03.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:03.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:34:03.275 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:c0:57:f1:f2:ae:60:a2:9b:0f:d6:c8:f3:44:41:a7:08:7f:2c:4d] modulus: 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 public exponent: 10001 ] 2022-03-08 12:34:59.703 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:34:59.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:34:59.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:34:59.706 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:34:59.707 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:34:59.708 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:34:59.708 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:34:59.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:34:59.709 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:34:59.711 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:34:59.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:34:59.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:34:59.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:34:59.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:34:59.868 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:34:59.869 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:34:59.869 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:34:59.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:34:59.873 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:34:59.873 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:34:59.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:59.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:59.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:59.875 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:59.876 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:59.876 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:59.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:34:59.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:34:59.878 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:34:59.879 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:34:59.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:5c:17:ff:f3:0b:16:39:3a:f8:c3:4c:fe:63:de:75:13:9e:d7:85] modulus: 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 public exponent: 10001 ] 2022-03-08 12:36:13.909 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:36:13.911 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:36:13.913 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:36:13.915 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:36:13.915 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:36:13.923 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:36:13.927 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:36:13.927 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:36:13.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:36:13.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:36:13.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:36:13.940 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:36:13.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:36:13.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:36:14.198 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:36:14.200 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:36:14.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:36:14.201 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:36:14.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:36:14.203 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:36:14.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:36:14.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:36:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:36:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:36:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:36:14.211 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:36:14.214 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:36:14.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:36:14.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:36:14.218 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:36:14.224 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:33:13:53:b0:00:83:77:67:61:5e:ae:c3:9a:66:9e:35:f4:97:98] modulus: e1182b7332339d82425484c73aba0da49e7c91be7600af83ad25cd4743f104b1613468beeb20c3259ef709958670ae80b66c0de0655954579e19749acefce63d584b6c7b29985cbcd2e69ca01537cdb2c4b36d9c232222f741334761131f2e61515ad8001c7513f529edc9ae6226b08cd452cca55423d67e60565f470c5f4725a1a0761afb48a1ee994449ed3342b39a01344df77d3c02a4dcf3b61d4b34a548cc228a727b69235a87112853f20e353ba7955b3d3a504200345936708fa2f42c01b18d15311988d1bfaa17b820ef68c4d3a46dc33ff5e008f6abf243fb358fee2e4edbc2a2c0bd9a02fdee17a10e71a43c6d60e8cf7ee03884a8640e703b79bd public exponent: 10001 ] 2022-03-08 12:38:34.199 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:38:34.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:38:34.206 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:38:34.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:38:34.208 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:38:34.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:38:34.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:38:34.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:38:34.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:38:34.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:38:34.218 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:38:34.220 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:38:34.220 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:38:34.221 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:38:34.369 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:38:34.370 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:38:34.370 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:38:34.371 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:38:34.373 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:38:34.374 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:38:34.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:34.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:34.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:34.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:34.376 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:34.376 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:34.377 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:34.377 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:34.377 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:34.378 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:38:34.382 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:f5:b0:03:09:ca:c3:ca:6f:d0:a9:ce:a4:95:7e:71:66:f8:d3:63] modulus: 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 public exponent: 10001 ] 2022-03-08 12:38:46.919 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:38:46.920 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:38:46.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-08 12:38:46.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:38:46.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-08 12:38:46.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:38:46.924 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:38:46.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:38:46.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:38:46.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:38:46.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:38:46.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:38:46.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:38:46.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:38:47.045 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:38:47.046 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:38:47.046 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:38:47.046 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:38:47.048 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:38:47.048 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:38:47.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:47.049 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:47.049 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:47.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:47.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:47.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:47.051 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:38:47.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:38:47.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:38:47.053 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:38:47.056 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:07:47:94:f7:0b:2d:62:94:d9:82:53:b1:5e:23:7f:fc:da:f1:b4] modulus: b549ba3f9d8a8d87ddab2971e13126b99aae8f86622151bfda4dfa44400e6e75bbe29040b725091ab0e6f83ead5ca938be943ecc62117889df6b6650da6aaa6e78603ee9b23800d1e339ae07b777dff0458a55db1a2d08e31153608a3eada96894479f77206a90f964af269128465ef7305af158c7603d4edff66138c94bae2804cad94f622e69b23372a9618965b211cb9c510b4a82f95bb40bf9e64bf9f49134c99f33cf592d8de80b517275ac6800ddae3e15190da5c95c386aab80b40649862994c69f83f46a8b9e6da74ab48f48be0faa54feb3ca32feb8bf3f0503b4346eb2dfc8c2d2798a45f740303b2a6ec07620435f8dbd7373870632fe6b7a296d public exponent: 10001 ] 2022-03-08 12:39:06.793 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:39:06.794 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:39:06.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 12:39:06.797 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:39:06.797 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 12:39:06.799 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:39:06.799 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:39:06.800 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:39:06.800 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:39:06.801 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:39:06.806 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:39:06.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:39:06.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:39:06.807 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:39:06.946 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:39:06.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:39:06.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:39:06.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:39:06.950 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:39:06.950 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:39:06.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:06.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:06.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:06.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:06.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:06.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:06.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:06.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:06.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:06.956 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:39:06.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:6f:e2:ed:4c:0a:c0:01:28:a2:f4:54:c8:66:a4:43:6c:e6:92:d5] modulus: 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 public exponent: 10001 ] 2022-03-08 12:39:43.984 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:39:43.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:39:43.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 12:39:43.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:39:43.988 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 12:39:43.989 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:39:43.989 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:39:43.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:39:43.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:39:43.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:39:43.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:39:43.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:39:43.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:39:43.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:39:44.134 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:39:44.135 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:39:44.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:39:44.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:39:44.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:39:44.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:39:44.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:44.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:44.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:44.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:44.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:44.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:44.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:39:44.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:39:44.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:39:44.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:39:44.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:d8:78:4e:2d:34:4e:b1:d6:1e:ab:ce:1c:d6:eb:94:70:78:7d:a4] modulus: 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 public exponent: 10001 ] 2022-03-08 12:41:48.802 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:41:48.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:41:48.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:41:48.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:41:48.806 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:41:48.807 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:41:48.807 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:41:48.808 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:41:48.808 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:41:48.809 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:41:48.814 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:41:48.814 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:41:48.815 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:41:48.815 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:41:48.965 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:41:48.965 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:41:48.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:41:48.966 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:41:48.967 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:41:48.967 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:41:48.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:41:48.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:41:48.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:41:48.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:41:48.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:41:48.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:41:48.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:41:48.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:41:48.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:41:48.971 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:41:48.975 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:80:a7:ce:50:b2:1f:42:1c:92:5d:b1:89:87:ae:fd:61:09:56:52] modulus: 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 public exponent: 10001 ] 2022-03-08 12:52:12.579 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:52:12.583 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:52:12.587 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 12:52:12.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:52:12.588 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 12:52:12.589 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:52:12.590 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:52:12.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:52:12.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:52:12.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:52:12.598 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:52:12.599 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:52:12.599 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:52:12.599 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:52:12.797 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:52:12.798 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:52:12.798 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:52:12.799 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:52:12.801 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:52:12.801 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:52:12.802 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:52:12.803 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:52:12.803 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:52:12.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:52:12.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:52:12.805 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:52:12.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:52:12.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:52:12.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:52:12.807 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:52:12.811 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:ff:e1:52:02:d8:da:f2:f6:27:e8:40:c2:fb:d9:a1:ed:22:61:69] modulus: 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 public exponent: 10001 ] 2022-03-08 12:56:20.662 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:56:20.664 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:56:20.666 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:56:20.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:56:20.668 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 12:56:20.669 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:56:20.669 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:56:20.669 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:56:20.670 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:56:20.670 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:56:20.675 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:56:20.676 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:56:20.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:56:20.677 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:56:20.880 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:56:20.881 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:56:20.881 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:56:20.882 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:56:20.883 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:56:20.884 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:56:20.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:20.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:20.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:20.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:20.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:20.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:20.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:20.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:20.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:20.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:56:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:5f:bd:de:52:a5:6c:c8:af:02:5d:70:9d:6b:46:b3:51:a8:c5:4a] modulus: bd9502289459844be024f9d411c901d7940f5c1913f01682486ddf0b83c2ffee31582286f410049bb8b0d97cef8cae151bdfd2f45a7b55c141615267b90150946e662f78c1bc22dbc8871e04518cb859bbf1a4e1fa1b79efc7dd27406cc5bcb66112fe321ccfee01a11a793898acfbecb879a813773463731655894f6081cbcd9e0e6739d7324465a94640d0d5c6c1fdcc32188ba88472e4ee1d0d666bf96aea97509181e99a663bf43365ca359e4823099a95226c23f7c75aeb33cb9de417eb5a1705100a45c12e2863c7f6688ed620c29d6cf335c51231120448cf58a0966ec9306702bbfdf96d80896485d62948b6b81909a284fd7e4a75c4872c6cc2882b public exponent: 10001 ] 2022-03-08 12:56:54.633 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:56:54.635 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:56:54.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 12:56:54.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:56:54.637 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 12:56:54.638 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:56:54.638 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:56:54.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:56:54.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:56:54.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:56:54.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:56:54.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:56:54.644 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:56:54.645 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:56:54.784 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:56:54.784 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:56:54.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:56:54.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:56:54.787 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:56:54.788 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:56:54.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:54.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:54.788 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:54.791 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:54.791 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:54.792 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:54.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:56:54.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:56:54.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:56:54.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:56:54.804 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:62:f0:81:ba:f4:a3:69:79:8a:c6:86:23:23:f7:19:7f:0c:6d:0e] modulus: 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 public exponent: 10001 ] 2022-03-08 12:57:28.606 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:57:28.607 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:57:28.609 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 12:57:28.609 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:57:28.610 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 12:57:28.610 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:57:28.611 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:57:28.611 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:57:28.611 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:57:28.612 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:57:28.616 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:57:28.617 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:57:28.617 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:57:28.617 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:57:28.741 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:57:28.742 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:57:28.743 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:57:28.743 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:57:28.745 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:57:28.746 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:57:28.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:57:28.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:57:28.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:57:28.750 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:57:28.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:57:28.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:57:28.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:57:28.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:57:28.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:57:28.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:57:28.762 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:20:8b:12:ce:be:aa:91:67:d4:b0:74:a3:0a:cf:67:59:bd:60:ed] modulus: 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 public exponent: 10001 ] 2022-03-08 12:59:15.720 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 12:59:15.721 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 12:59:15.722 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:59:15.723 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 12:59:15.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 12:59:15.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 12:59:15.724 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 12:59:15.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 12:59:15.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 12:59:15.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 12:59:15.730 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 12:59:15.731 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:59:15.731 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 12:59:15.731 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:59:15.896 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 12:59:15.896 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 12:59:15.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 12:59:15.897 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 12:59:15.898 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 12:59:15.898 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 12:59:15.899 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:59:15.899 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:59:15.899 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:59:15.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:59:15.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:59:15.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:59:15.900 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 12:59:15.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 12:59:15.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 12:59:15.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 12:59:15.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:33:28:81:93:dd:be:5d:ef:95:35:52:b1:d9:60:46:75:7e:a6:42] modulus: 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 public exponent: 10001 ] 2022-03-08 13:00:06.797 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:00:06.798 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:00:06.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:00:06.799 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:00:06.800 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:00:06.800 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:00:06.801 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:00:06.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:00:06.801 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:00:06.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:00:06.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:00:06.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:00:06.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:00:06.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:00:06.962 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:00:06.962 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:00:06.963 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:00:06.963 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:00:06.965 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:00:06.965 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:00:06.966 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:00:06.966 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:00:06.966 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:00:06.967 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:00:06.968 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:00:06.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:00:06.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:00:06.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:00:06.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:00:06.972 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:00:06.975 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:52:44:1f:95:7b:9d:4f:51:3f:0a:10:31:3f:fc:86:25:0a:ee:08] modulus: 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 public exponent: 10001 ] 2022-03-08 13:03:58.179 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:03:58.181 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:03:58.182 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:03:58.183 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:03:58.183 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:03:58.184 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:03:58.184 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:03:58.184 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:03:58.184 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:03:58.185 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:03:58.189 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:03:58.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:03:58.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:03:58.190 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:03:58.374 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:03:58.375 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:03:58.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:03:58.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:03:58.377 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:03:58.377 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:03:58.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:03:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:03:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:03:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:03:58.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:03:58.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:03:58.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:03:58.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:03:58.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:03:58.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:03:58.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:6f:89:bf:28:bd:46:9e:47:b6:e9:f9:8f:f6:4d:ae:1d:29:60:3a] modulus: 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 public exponent: 10001 ] 2022-03-08 13:04:34.752 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:04:34.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:04:34.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:04:34.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:04:34.759 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:04:34.760 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:04:34.760 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:04:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:04:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:04:34.762 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:04:34.767 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:04:34.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:04:34.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:04:34.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:04:34.924 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:04:34.926 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:04:34.927 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:04:34.927 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:04:34.928 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:04:34.928 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:04:34.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:04:34.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:04:34.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:04:34.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:04:34.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:04:34.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:04:34.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:04:34.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:04:34.931 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:04:34.932 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:04:34.935 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:e6:73:e7:55:3d:39:4d:70:56:1e:31:d9:03:dd:b7:be:c6:7a:a2] modulus: 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 public exponent: 10001 ] 2022-03-08 13:05:04.722 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:05:04.723 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:05:04.724 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:05:04.725 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:05:04.725 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:05:04.726 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:05:04.726 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:05:04.727 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:05:04.727 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:05:04.727 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:05:04.732 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:05:04.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:05:04.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:05:04.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:05:04.859 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:05:04.859 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:05:04.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:05:04.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:05:04.861 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:05:04.861 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:05:04.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:05:04.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:05:04.862 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:05:04.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:05:04.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:05:04.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:05:04.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:05:04.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:05:04.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:05:04.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:05:04.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:e9:da:7d:75:13:b6:1e:6f:73:a6:2b:0c:e3:c3:19:be:90:44:0c] modulus: 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 public exponent: 10001 ] 2022-03-08 13:07:52.285 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:07:52.286 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:07:52.287 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:07:52.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:07:52.288 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:07:52.289 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:07:52.289 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:07:52.289 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:07:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:07:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:07:52.295 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:07:52.296 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:07:52.296 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:07:52.297 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:07:52.487 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:07:52.487 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:07:52.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:07:52.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:07:52.490 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:07:52.490 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:07:52.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:07:52.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:07:52.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:07:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:07:52.492 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:07:52.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:07:52.493 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:07:52.494 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:07:52.494 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:07:52.495 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:07:52.498 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:41:c3:56:9a:63:a6:87:7b:fb:4f:5b:59:f0:eb:ec:d4:bd:77:89] modulus: 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 public exponent: 10001 ] 2022-03-08 13:11:40.854 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:11:40.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:11:40.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:11:40.857 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:11:40.857 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:11:40.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:11:40.858 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:11:40.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:11:40.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:11:40.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:11:40.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:11:40.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:11:40.864 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:11:40.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:11:40.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:11:41.000 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:11:41.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:11:41.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:11:41.002 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:11:41.003 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:11:41.003 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:11:41.003 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:11:41.003 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:11:41.004 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:11:41.004 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:11:41.004 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:11:41.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:11:41.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:11:41.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:11:41.006 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:11:41.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:89:3c:d9:f6:b6:16:4e:4b:f9:ed:7f:a5:18:25:cb:52:77:45:88] modulus: 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 public exponent: 10001 ] 2022-03-08 13:12:13.671 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:12:13.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:12:13.674 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:12:13.675 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:12:13.676 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:12:13.676 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:12:13.677 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:12:13.677 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:12:13.677 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:12:13.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:12:13.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:12:13.683 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:12:13.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:12:13.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:12:13.824 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:12:13.825 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:12:13.825 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:12:13.825 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:12:13.827 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:12:13.827 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:12:13.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:13.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:13.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:13.829 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:13.829 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:13.829 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:13.830 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:13.831 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:13.831 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:12:13.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:09:6f:8a:e5:94:1d:7b:eb:96:1e:eb:a7:44:ec:c2:4a:9b:6b:8a] modulus: e7cee6b2e55ca7cb3fa6a98a1903740f413317b7e204a0e82f42e74160e66c6a68c02784bf51896a1c6aff1b75523b30364aea5beaeaa1cd560558d7e2285e75fbb5177568c0a67e8564fd4ca5034ad7dfeac7b5a14ff59f147119b15ee164e871a303285e3ca2813e4688fdba986a963c52d28272d6dd565a4b5af95a1ac14bfabe942473b8fd1b32b69cccb1380180c2b50464c2c076b3beddb2a65c83b366d3396386c540e754eafeb10343bf1a58bcfaa5c2a40a5bdb4bceb9bbcd38794436381e16774c061c299714d111972433b602c6b83b1b8ab4341c442fb932f535428cc76e857109ba4f3437953987312c5e812c11b294ef611c453926fe786cc5 public exponent: 10001 ] 2022-03-08 13:12:47.743 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:12:47.746 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:12:47.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:12:47.748 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:12:47.749 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:12:47.749 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:12:47.750 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:12:47.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:12:47.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:12:47.751 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:12:47.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:12:47.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:12:47.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:12:47.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:12:47.957 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:12:47.958 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:12:47.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:12:47.959 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:12:47.961 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:12:47.961 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:12:47.961 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:47.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:47.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:47.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:47.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:47.963 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:47.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:12:47.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:12:47.964 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:12:47.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:12:47.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:12:21:9b:bc:79:13:31:b7:54:f6:88:36:f0:39:b1:74:81:b3:43] modulus: 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 public exponent: 10001 ] 2022-03-08 13:14:36.569 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:14:36.571 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:14:36.573 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:14:36.574 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:14:36.574 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:14:36.575 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:14:36.575 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:14:36.575 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:14:36.576 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:14:36.576 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:14:36.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:14:36.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:14:36.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:14:36.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:14:36.738 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:14:36.739 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:14:36.739 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:14:36.739 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:14:36.740 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:14:36.740 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:14:36.740 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:14:36.741 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:14:36.741 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:14:36.741 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:14:36.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:14:36.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:14:36.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:14:36.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:14:36.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:14:36.743 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:14:36.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:e0:00:82:48:e2:d5:0b:59:f3:f0:a4:13:12:3a:4f:81:e5:af:ad] modulus: c96205e0c2a829e51a0a6505a0d76b3d5ef047fdf9b07cb0da49ed8d788e5b103f92ba425fc2c1e0e0b4877a29ce2951267f00a32e43993a0aaa8caea67dab2a583006186d930db56a8f28ee5db35888924cdb1765f6ecef772eab3268daae26f6c475c44bcef12e76052db0ab987ad65fca3328a1eb1ac2c91d31ce5ebd4a30aa78b201b712979e3ede003da8c1316559e71a93b07d7d97d5e50ba2031915f78450522e5f6c9af7cbd1420c362ac10ea0a5fb3583256f007c0e53ad50d924b9d109922c06d012ebc1c9bad2e42dd8eaae07e60af6f0b91a20045a7008a8fe6f601432ddfbb46816bcb37cbb5083ff430890b07b915e12a7d356c517615376bb public exponent: 10001 ] 2022-03-08 13:26:23.096 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:26:23.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:26:23.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:26:23.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:26:23.109 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:26:23.110 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:26:23.111 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:26:23.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:26:23.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:26:23.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:26:23.122 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:26:23.123 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:26:23.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:26:23.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:26:23.315 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:26:23.316 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:26:23.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:26:23.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:26:23.318 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:26:23.318 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:26:23.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:26:23.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:26:23.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:26:23.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:26:23.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:26:23.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:26:23.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:26:23.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:26:23.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:26:23.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:26:23.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:db:a2:fd:6e:c6:de:5b:88:db:78:5e:4c:02:bf:c9:b8:c2:a0:15] modulus: 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 public exponent: 10001 ] 2022-03-08 13:30:11.886 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:30:11.887 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:30:11.889 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:30:11.889 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:30:11.890 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:30:11.890 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:30:11.891 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:30:11.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:30:11.891 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:30:11.892 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:30:11.897 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:30:11.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:30:11.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:30:11.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:30:12.105 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:30:12.105 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:30:12.105 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:30:12.106 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:30:12.107 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:30:12.107 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:30:12.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:12.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:12.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:12.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:12.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:12.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:12.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:12.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:12.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:12.110 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:30:12.113 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:b2:9a:8c:af:c5:13:37:09:f9:7a:f2:f4:e0:83:cf:ee:ed:0f:d3] modulus: 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 public exponent: 10001 ] 2022-03-08 13:30:45.376 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:30:45.377 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:30:45.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:30:45.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:30:45.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:30:45.380 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:30:45.380 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:30:45.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:30:45.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:30:45.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:30:45.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:30:45.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:30:45.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:30:45.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:30:45.536 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:30:45.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:30:45.537 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:30:45.537 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:30:45.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:30:45.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:30:45.539 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:45.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:45.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:45.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:45.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:45.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:45.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:30:45.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:30:45.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:30:45.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:30:45.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:6d:cb:69:15:99:78:cd:0b:e1:05:55:98:16:96:9a:fc:23:e9:8e] modulus: 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 public exponent: 10001 ] 2022-03-08 13:31:18.875 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:31:18.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:31:18.877 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:31:18.882 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:31:18.883 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:31:18.883 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:31:18.884 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:31:18.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:31:18.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:31:18.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:31:18.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:31:18.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:31:18.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:31:18.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:31:19.021 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:31:19.021 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:31:19.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:31:19.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:31:19.023 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:31:19.023 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:31:19.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:31:19.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:31:19.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:31:19.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:31:19.025 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:31:19.025 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:31:19.025 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:31:19.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:31:19.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:31:19.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:31:19.029 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:40:12:d0:96:e9:1f:d7:95:17:a2:b9:1c:19:a4:4d:65:66:01:0a] modulus: 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 public exponent: 10001 ] 2022-03-08 13:33:07.623 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:33:07.625 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:33:07.627 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:33:07.627 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:33:07.628 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:33:07.628 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:33:07.629 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:33:07.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:33:07.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:33:07.631 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:33:07.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:33:07.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:33:07.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:33:07.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:33:07.790 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:33:07.791 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:33:07.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:33:07.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:33:07.793 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:33:07.793 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:33:07.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:33:07.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:33:07.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:33:07.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:33:07.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:33:07.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:33:07.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:33:07.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:33:07.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:33:07.797 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:33:07.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: e81ccbb2528fbe0413a90528d2fc6fd72a7175acd19fa05c6c46736c19ee75ad2f4707ed51336c88ac96f1a9e857e0ec57f7dce5db3859d90e8790d308a753538fbe4f5a94fd43dbfd73ad2da1ded266d0f2eb7098bebb74015166d7b347360bff854e9656ffce6a46088f9864fe9439be14d2a8e10a9432e30f41de0126995d6f09f40e674b5712a18276cf923f5546c93a7d4bdb0f268b6c3050502c5877fd2ae61c5c65bdc9239d8bd82b5308308bb8c5030608c3b556d7521c3082166c0e5877a78eefe91d568552a1e6627d93cc854d4e4200d1b527b0d1402f9e222c7b25698813a29f31b8ed1cd4d1ca5613229259d87dda3ab3c3943fe8176ee1514ba59014c81f2414462521a2a1c735052a00e00e2f18909283c0d6266a2c3890dba2b6b1748203c2ff5a1125bcaeddf23ead29ffb745e04d9f1ed462e02ad7338c0df6696362cedefda93cde07d0dc092c9b50dd8933d8c132de9b4fbe7733dd585791e818fc1e0a6058dbb9a123af08ff1d0b201faa00d47c262f620534418e83 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:94:5e:67:6f:e4:c4:96:3c:6c:47:4f:34:4a:5b:d8:46:48:b1:eb] modulus: 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 public exponent: 10001 ] 2022-03-08 13:47:09.939 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:47:09.946 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:47:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:47:09.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:47:09.951 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 13:47:09.952 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:47:09.953 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:47:09.953 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:47:09.954 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:47:09.954 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:47:09.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:47:09.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:47:09.963 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:47:09.963 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:47:10.124 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:47:10.125 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:47:10.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:47:10.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:47:10.127 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:47:10.127 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:47:10.128 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:47:10.128 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:47:10.128 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:47:10.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:47:10.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:47:10.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:47:10.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:47:10.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:47:10.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:47:10.131 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:47:10.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:c4:64:bc:32:dc:05:db:8a:e9:4f:58:d9:90:0e:bf:53:be:86:ee] modulus: dcfc4eade8220e093d95e8135ef9e7ba75cbfcd4b14a465c0748ff1899aa9c92117cb092760139590f4b3549d673d90251c8491bbc58c3fba3bd2f49a49ba547eb45b2f52dddb776a9e788053377c30a6e0d4486aca0557bed900dc9310667270371f8f6116a99fe7edb762a6ceba59489eee8ace0a79ebd71f37c7f8259277954bd3679c6287b724bc5d67ead4158336ae709d188e60f656d64b15b7b16a1381fa2bd8f4c0e19bdc48c3c80fb35115c5ee6ff423b6e09a5ffe6feb5816c3743e3fb0d55c97e6a641f72434e05de720e0a9fac2d0c14410bf90ad288ed8d02ed8cee8c5b40dc431074ec9c29a9a2d008ce942788a6058a134fec6abc69f09195 public exponent: 10001 ] 2022-03-08 13:50:59.523 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:50:59.525 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:50:59.526 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:50:59.527 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:50:59.527 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 13:50:59.528 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:50:59.529 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:50:59.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:50:59.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:50:59.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:50:59.535 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:50:59.535 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:50:59.535 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:50:59.536 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:50:59.695 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:50:59.696 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:50:59.696 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:50:59.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:50:59.698 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:50:59.698 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:50:59.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:50:59.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:50:59.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:50:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:50:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:50:59.700 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:50:59.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:50:59.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:50:59.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:50:59.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:50:59.705 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:56:b2:24:c3:19:59:a6:a5:80:f0:dd:d7:51:99:3a:22:64:c0:c0] modulus: d1f04c4d6bd4f59a288902740886dbb403bdaea126f619996f12fdd67172724d1c507311d53465b982c48e7fa8fa7e661c09435bc3dac31365bad2c2eb503a92cacf7377135025483761a50577cd2e0c492dcb474ee0cd52be01b0e52e46f6379330939664a4c83496c77828cb349ba414f2a3e3e8ddc99c7b3c8c65071ac2163384d2f68690fe98fef1537870d7ef9d160497d62a6cf550f1011cd313235f30fa53728696761c6ab6883cc7ce2347fc0ffc541164218d57e432c30a1c8b1a743b9b2e2a9eed1f97885e05ad7d71651e8ae82417396141ad1d93f203d830db30266f75aeec6982273575a7b8749784463563827dc15a22059ae874dda856130b public exponent: 10001 ] 2022-03-08 13:51:33.162 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:51:33.163 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:51:33.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:51:33.164 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:51:33.165 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 13:51:33.165 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:51:33.166 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:51:33.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:51:33.166 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:51:33.167 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:51:33.174 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:51:33.175 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:51:33.175 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:51:33.175 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:51:33.344 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:51:33.345 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:51:33.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:51:33.346 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:51:33.347 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:51:33.347 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:51:33.347 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:51:33.348 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:51:33.348 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:51:33.348 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:51:33.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:51:33.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:51:33.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:51:33.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:51:33.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:51:33.351 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:51:33.354 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:c6:99:43:ad:e6:63:60:f0:11:e4:6b:62:19:c9:93:88:72:6b:1d] modulus: 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 public exponent: 10001 ] 2022-03-08 13:52:07.466 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:52:07.468 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:52:07.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:52:07.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:52:07.470 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 13:52:07.470 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:52:07.471 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:52:07.471 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:52:07.472 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:52:07.472 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:52:07.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:52:07.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:52:07.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:52:07.478 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:52:07.648 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:52:07.649 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:52:07.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:52:07.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:52:07.651 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:52:07.651 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:52:07.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:52:07.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:52:07.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:52:07.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:52:07.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:52:07.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:52:07.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:52:07.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:52:07.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:52:07.655 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:52:07.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:f2:09:90:f7:5f:57:67:74:cf:85:db:48:af:57:d9:ad:e3:97:f6] modulus: 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 public exponent: 10001 ] 2022-03-08 13:53:57.756 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-08 13:53:57.757 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-08 13:53:57.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:53:57.759 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 13:53:57.759 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 13:53:57.760 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-08 13:53:57.760 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-08 13:53:57.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-08 13:53:57.760 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-08 13:53:57.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-08 13:53:57.766 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-08 13:53:57.767 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:53:57.767 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-08 13:53:57.767 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:53:57.898 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-08 13:53:57.899 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-08 13:53:57.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-08 13:53:57.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 13:53:57.900 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-08 13:53:57.900 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-08 13:53:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:53:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:53:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:53:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:53:57.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:53:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:53:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 13:53:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-08 13:53:57.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-08 13:53:57.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 13:53:57.905 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 365596617218722161808517527220339616662791506690 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 10:32:08 UTC 2022 Final Date: Sun Mar 07 10:32:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:51:ed:61:ef:2a:97:d2:3f:84:c9:b4:a1:3c:2c:c9:25:45:23:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 67e8762e457199768cfb881f8bbe9af73e778f5f d8b381fdf53edcdf56251051ebf20ba637cdbbc2 fae5863a422151d29748b55513a6d8e3dbdde89e 264d89f9bd4667863b93f3e272a1d9deadcc3541 6cb824a61fdcda2d6a65ca4b71124e406b7636b4 3a2128e3dd793d6935087ea2a2cb9af266a14a31 67517cb6b77998edb389ed6de31c70f36f7f5baa 13c26932e206eeaeb3451852766d271a1ad08f86 0c83f66af8bb8fb287537dc8cb123c94a6b9c910 f417d6455147e73ea2cd389cbba398a4b333017c 9a91d168367b1fe374019b63d56bb8a375ac3698 c1e0a622f77f6b10d323dfc20b8d95ababe54273 8422239c0f1a21a70608f284361a9c101742be5a c41af115794b0103fcd803363e444117006b4eec d71b00d068149554b2948ec291ba2d982adac7c8 91e9a0f5f6123e3bed231486c9fbb4189da4e5d8 cc44234e191aa8b03b9f88beb3d9085c959da5bb f1e908e0103b71dfa590d448cfda874451dcffde 68b126244b2e0b942463eed2c0e986f45c22ef29 390fe251 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:a5:3c:69:77:c2:e8:04:43:c4:83:7a:54:c7:1e:6a:7e:fa:bf:11] modulus: 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 public exponent: 10001 ]