By type
2022-03-10 03:15:43,849 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-10 03:15:45,764 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-10 03:15:46.943 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 10, 2022 3:15:49 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 10, 2022 3:15:49 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 10, 2022 3:15:49 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 10, 2022 3:15:49 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-10 03:15:50.471 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-10 03:15:50.858 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-10 03:15:51.039 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-10 03:15:52.135 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-10 03:15:52.140 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-10 03:15:52.142 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-10 03:15:52.149 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-10 03:15:52.207 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-10 03:15:52.211 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-10 03:15:52.379 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-10 03:15:53.512 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 10, 2022 3:15:54 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-10 03:15:55.167 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 12.846 seconds (JVM running for 15.573) Mar 10, 2022 3:16:17 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-10 04:01:10.359 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:01:10.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:01:10.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-10 04:01:10.441 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:01:10.463 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-10 04:01:10.467 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:01:10.468 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:01:10.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:01:10.472 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:01:10.478 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:01:10.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:01:10.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:01:10.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:01:10.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:01:10.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:01:10.567 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:01:11.331 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:01:11.334 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:01:11.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:01:11.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:01:11.346 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:01:11.348 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:01:11.348 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:01:11.349 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:01:11.349 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:01:11.366 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:01:11.367 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:01:11.368 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:01:11.375 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:01:11.376 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:01:11.376 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:01:11.378 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:01:11.406 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:5c:35:bb:29:4f:fb:61:04:96:63:e2:55:a1:47:e2:4a:d1:a9:63] modulus: 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 public exponent: 10001 ] 2022-03-10 04:02:30.290 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:02:30.291 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:02:30.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 04:02:30.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:02:30.295 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 04:02:30.297 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:02:30.297 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:02:30.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:02:30.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:02:30.299 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:02:30.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:02:30.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:02:30.326 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:02:30.328 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:02:30.484 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:02:30.485 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:02:30.486 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:02:30.486 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:02:30.490 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:02:30.491 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:02:30.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:02:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:02:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:02:30.495 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:02:30.496 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:02:30.496 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:02:30.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:02:30.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:02:30.500 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:02:30.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:02:30.511 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:71:f9:c1:5a:5b:94:d7:ed:73:a6:43:9f:46:fd:ba:c6:db:68:90] modulus: b6a0e7e015065b02419052702aa1978314a84f08fadb70c0d7b58e0e662dc92bb3934ec04a73972b754fd8c75d990fc231e2d49cb8e21635af8d8014649284d1cc355fc196d676b38fe5859eb8cfa8dc244c6735ebff40d5fd62f7be883f047f17d2ffd27913dec63052a0c628f8513d856f8de02ad6729d59e5cef74975f391423b4ad5ae9b9b0e06336eceb27ed028a0c0e721e27759860c028b657e22fdc2bcd480c21b7ea15b4a4466df6bd39c0d9bc003c3c4dbf44e83997a38690846f993d3d39fd15260139eaa474fc4b6a1a31875c40ea8e6d2031adca82b128c0b705ffe6d7ecfb8feea92fe307e2a225cdf98d969ba0050f27eab810ec315aab5f7 public exponent: 10001 ] 2022-03-10 04:04:02.037 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:04:02.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:04:02.042 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 04:04:02.042 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:04:02.043 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 04:04:02.044 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:04:02.045 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:04:02.045 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:04:02.046 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:04:02.047 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:04:02.055 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:04:02.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:04:02.058 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:04:02.058 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:04:02.201 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:04:02.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:04:02.202 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:04:02.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:04:02.205 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:04:02.205 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:04:02.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:04:02.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:04:02.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:04:02.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:04:02.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:04:02.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:04:02.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:04:02.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:04:02.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:04:02.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:04:02.215 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:cd:fd:ef:29:22:38:7f:3f:27:7e:38:49:f3:15:5a:12:f6:be:2f] modulus: ddfaad584ac096875d76fc9754daf4dd7817ed93c7deb52e7261c1e9a41facca79aa1a36e7c29f0877587b28208509f00d933b2c32839c91c8739938787c3f41766af8092ebd6b9708d604f02aead34e940664968d884f02dd38fbc31a4b69ba72e8228f780624ecee5c2a63d5dcda89a303826ca022adbee2ff451cb746024d3dfa5ecdb4f45e340309b3974a19957306e8f25c6d8e5931711fe8ff3515a84b24c04cbb41bb082c83a025d06ecabced3e6c3caba9e2c4ffef01f54a6b578f1916513d77cba511b910ab19bf5e1b2a8789eafa961a2a806d42130209931fb70716a6c708b8b2e70acd3f85bbf50d22b14250ab42177330ed0de796b3364ffafb public exponent: 10001 ] 2022-03-10 04:05:24.149 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:05:24.150 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:05:24.152 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 04:05:24.153 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:05:24.154 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 04:05:24.155 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:05:24.156 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:05:24.156 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:05:24.156 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:05:24.157 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:05:24.163 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:05:24.164 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:24.164 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:24.165 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:24.298 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:05:24.299 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:05:24.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:05:24.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:24.302 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:05:24.302 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:05:24.304 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:24.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:24.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:24.306 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:24.306 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:24.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:24.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:24.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:24.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:24.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:05:24.316 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:78:e0:e4:f0:3b:28:96:49:31:92:69:09:8d:62:bf:a5:d5:46:fc] modulus: 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 public exponent: 10001 ] 2022-03-10 04:05:55.000 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:05:55.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:05:55.005 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-10 04:05:55.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:05:55.007 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-10 04:05:55.008 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:05:55.009 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:05:55.009 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:05:55.010 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:05:55.011 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:05:55.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:05:55.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:55.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:55.022 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:55.197 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:05:55.199 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:05:55.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:05:55.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:55.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:05:55.203 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:05:55.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.207 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.208 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.209 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:05:55.219 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: b022491f9cd7cb01be5178ba0fac81604313043b630a9d71bb3bac36a0535b4950fcb793bb51f0f3e95a45a27911438ea6cbb0accec791cac42d75241c5d90736a2dc244f9f0ae917ed90f695a507024e4fda29e6c5d496555024f1bdba2da762b10b96424d40bc305734eec4f9cac839005da871fc61fce967e2b0c6d9f80e92fff017aa2c110d854eab2480a9e197f245976143ac46e858175c2fd9cc0e7cca067956c4e1102a19db4fcf87f0d25ab26d54a1180fd72aed4273d1e46e0bbd1ea1668eaa40bb3c426df80337d9b2c96984edb2bcaba01f6a5531bdac51d27af9048bf705ecda6626d9d69288e0ce8360735ae91dc72662ad3778b236ac74f6663b8b7204ff6ad16bb1f84882317bd1a5b69655dc9004ffc9d4251f935238381289a246bfd3de676f15766cbce1f2e5f58135894f6a9366b9a01d41bf28f057d35ce817a12c60b5376c72821fba68a5e1fac939ef0ebd571cc7ef37a9862bb299bcb2192b2b66e9a2c6cc5991242f651d80b8b01e88c591075a586af2be22117 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:e3:b2:f8:ce:f0:ea:8a:82:43:51:93:ea:59:33:f6:8f:ea:8f:69] modulus: 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 public exponent: 10001 ] 2022-03-10 04:05:55.849 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:05:55.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:05:55.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-10 04:05:55.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:05:55.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-10 04:05:55.854 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:05:55.855 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:05:55.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:05:55.856 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:05:55.856 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:05:55.861 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:05:55.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:55.862 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:05:55.863 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:55.940 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:05:55.946 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:05:55.947 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:05:55.948 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:05:55.954 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:05:55.957 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:05:55.959 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.960 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.960 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.961 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.963 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:05:55.964 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:05:55.964 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:05:55.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:05:55.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:fd:0e:89:d0:2f:5f:bc:20:4f:86:cf:d0:d6:69:3d:08:ba:5a:b9] modulus: c2c9d90947365196e8b48078a337f99dae0d779b3008c85765bd432246868e00369b37ee7f4def55d7bc97f8aa32019b50b94e51433777594c10ca9797589a57e716c8aee34c8d73d89ad6e40c47109453b184d93899767d4dbe4ffe73e8abfda6f111f021526c22f32da7ec1911d81fb8f64b30f0027512ac3a518b59dc4bf9dcb00b916979e312e82786029fb7911230a981bf942f3a73ddbb5972511d7fd89c4efa145513fad15b369e247fa9e1b6cd842d856e147758a6098fce46b1dafba1a572df6770ea050e465a4a7588f4db1b9ab741cd0b2f5a5602db0deecc6ad53a0735a55bb50525f809465ab9da50d3048c9c1fab8d1acef2e192b841d1f533 public exponent: 10001 ] 2022-03-10 04:06:29.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:06:29.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:06:29.726 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-10 04:06:29.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:06:29.728 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-10 04:06:29.728 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:06:29.729 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:06:29.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:06:29.730 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:06:29.731 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:06:29.737 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:06:29.738 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:06:29.738 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:06:29.738 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:06:29.859 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:06:29.860 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:06:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:06:29.861 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:06:29.863 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:06:29.863 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:06:29.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:06:29.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:06:29.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:06:29.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:06:29.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:06:29.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:06:29.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:06:29.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:06:29.870 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:06:29.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:06:29.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:09:ca:74:b6:93:5a:74:1b:ab:dd:df:6c:77:55:8f:7a:51:43:e7] modulus: cd64179d3de775224bce033ba83a83556d9d0197cb50fb5e3a53559174c8ecf84b2af509b65d864109870ffe097991d0be3bf42744fd925ab2046f0fdf36d8a20086b0b009ff2c9292a3f709d0c7de26a36f8aec1d658d7d1549d20855d2d39a400a02fcd120b0e44afc5266b7c1b5fb741b65e5578c4ceae639959ee17532a2c644f0562385f00eb1158e689b02f000303b6702060c642642110e86c281848cff66716e2826a1155a6e72e127bb8d2c53a8f6c8951276bd8461ada6288e2e5a702aa5da8cb4abd3450339311a6a5e22e90fac733596cb5017e453f5cf2257b1355a948b38601f54fbc98add2c7c2906090bea7c8fa60c4dff8197f5365aaead public exponent: 10001 ] 2022-03-10 04:08:16.653 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 04:08:16.657 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 04:08:16.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 04:08:16.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 04:08:16.664 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 04:08:16.664 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 04:08:16.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 04:08:16.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 04:08:16.665 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 04:08:16.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 04:08:16.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 04:08:16.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:08:16.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 04:08:16.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:08:16.810 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 04:08:16.811 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 04:08:16.811 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 04:08:16.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 04:08:16.815 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 04:08:16.815 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 04:08:16.816 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:08:16.816 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:08:16.816 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:08:16.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:08:16.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:08:16.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:08:16.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 04:08:16.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 04:08:16.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 04:08:16.821 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 04:08:16.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 100682702793283069845779332382699155943241736795 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 02:53:23 UTC 2022 Final Date: Tue Mar 09 02:53:22 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:86:aa:ab:ee:46:7c:f9:4f:e1:45:7d:9f:d0:81:8a:80:37:bf:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7e22d44fbc4f7f81947c8e05909a1cab91bf9b2f 643838a26d16eb894591c627dc1b5273b38cbc93 bb996eca40e6bde399c4b7bb0e5ffb49273b74d1 0aa4c2a8bae21a2bed7b7a240e4be13394d363f2 5a630dc56e1a8f67eccf2b22fe0c2bd1d50968cd c907d39c78bab96d632c4ad0100bd5f99f599132 373b324bd57064c9e022432826b69a2d0362f518 1d81099b4af5dc1512b779932e1708063891174e 750082fac35c6d9d84005e1270c0443d627f6aa1 3f0b8497239dab98b16f2b8d5d621a1fce69b7f5 4bf3490c7db28570fb433ffcc5ba156eff1a62d6 fde1d9308aa3ed1d990eec1ac439942293fea500 e78a84b5eec50976fe003abe5bc8b7ae0e02a2a1 2838ab5a43e6f726122be829efde4bc8fbcae2e0 d9e25b1738d5a5d0f021228c1b6b8599a4922234 d9a442f0f12cb422fa9627101f97d1dd4c34fab2 323b9c97f934256cf4afb5d57880517f94cba3bf 27402ce9bc1b47917943ae940e63d50201d95bde ed1a5410f4619c7387e5889cbccff69b20f778d8 0eb83a58 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:78:d4:4d:00:1a:9f:d7:e2:b6:f8:23:e4:19:ab:20:91:31:db:fc] modulus: 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 public exponent: 10001 ]