By type
2022-03-10 15:00:10,416 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-10 15:00:11,947 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-10 15:00:12.919 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 10, 2022 3:00:15 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 10, 2022 3:00:15 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 10, 2022 3:00:15 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 10, 2022 3:00:15 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-10 15:00:16.580 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-10 15:00:17.061 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-10 15:00:17.317 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-10 15:00:18.240 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-10 15:00:18.243 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-10 15:00:18.244 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-10 15:00:18.248 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-10 15:00:18.294 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-10 15:00:18.298 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-10 15:00:18.462 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-10 15:00:19.176 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 10, 2022 3:00:20 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-10 15:00:20.571 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.242 seconds (JVM running for 13.633) Mar 10, 2022 3:00:44 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-10 15:52:36.419 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:52:36.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:52:36.475 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-10 15:52:36.482 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:52:36.527 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-10 15:52:36.533 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:52:36.535 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:52:36.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:52:36.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:52:36.544 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:52:36.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:52:36.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:52:36.625 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:52:36.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:52:36.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:52:36.640 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:52:37.409 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:52:37.412 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:52:37.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:52:37.414 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:52:37.424 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:52:37.425 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:52:37.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:52:37.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:52:37.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:52:37.440 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:52:37.440 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:52:37.441 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:52:37.447 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:52:37.447 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:52:37.448 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:52:37.450 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:52:37.479 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:0d:24:9c:20:9b:92:c4:d2:8d:79:c2:99:98:6f:c8:00:27:4c:6a] modulus: e8095bc40808a32f52f15b5d009c6cd9c96ac905f536ed5abf25b573f9a2b38c13583c4fa03c3af5442ddbc17a5351140e2fa8d5d2311957dc167e3424bf9e20f5410fb4a6b91ed4202ad252924601654708ecbf14ac30cfc1c00e2c08f8e3ace269dee2d1a2078b54b872745606b0fc477cab62e904a4f14ba705c64fca5fe8622445ecbfde76422197511a74942806e5759494e3a7ac06421b9ab139d18f9569e35cce90a5fa32a8d61fc783e27e4a832dcad8566e7d46c1cf8edf30d1b08ac372adda49c721ffef5d89f3ba16eb339b2521366496660f76481049b6c5560a2037b930cf1eef5c39fed44a7379e6559728f45eb58f3fc174b084967b29f5e3 public exponent: 10001 ] 2022-03-10 15:53:59.410 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:53:59.412 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:53:59.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 15:53:59.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:53:59.416 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 15:53:59.417 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:53:59.418 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:53:59.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:53:59.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:53:59.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:53:59.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:53:59.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:53:59.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:53:59.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:53:59.567 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:53:59.568 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:53:59.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:53:59.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:53:59.572 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:53:59.573 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:53:59.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:53:59.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:53:59.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:53:59.575 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:53:59.576 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:53:59.576 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:53:59.577 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:53:59.577 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:53:59.578 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:53:59.579 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:53:59.584 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:85:51:f2:e2:05:c2:be:58:5b:46:a7:86:a1:2b:ec:df:5b:f4:12] modulus: db2d3bb6d3a13db2ec2cab26d963b3d67c5a4dac6332251ac372657a2ac15b5b3d2aa61cc1b7d4a7ae92aba09e178b63c38378797cc60b0a1887095f7302b593d34111c3c716f399c7ae606dc9b4b2d4c766d6da53849e65da9b6882714f1452eb23083abe0aec666ec31833b6499411302f09e3a60ed9706a228d44de0829733267a3cb0ff701f3b2ecb364b4ee3ac3b75fbf53dd9b5435be9d810cb900f8b43dbd9b575672db55b455cea1f358f3fa618363e65fdd2b3caaa5e2f09d5e16d31c5b0e89632bbbad4bc2ad6f01b596f8d5b1370663ddd060321efb3d56a43647e673f2835417b43d11c208e30847355041b33ea9763d85801408d7711c2ce1cb public exponent: 10001 ] 2022-03-10 15:55:08.832 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:55:08.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:55:08.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 15:55:08.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:55:08.837 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 15:55:08.838 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:55:08.838 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:55:08.839 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:55:08.839 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:55:08.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:55:08.868 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:55:08.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:55:08.871 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:55:08.872 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:55:09.004 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:55:09.005 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:55:09.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:55:09.007 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:55:09.011 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:55:09.012 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:55:09.013 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:55:09.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:55:09.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:55:09.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:55:09.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:55:09.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:55:09.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:55:09.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:55:09.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:55:09.024 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:55:09.032 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:99:ff:e0:50:15:5a:5a:f4:45:a9:7d:59:a1:8e:f7:17:ec:6d:6e] modulus: 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 public exponent: 10001 ] 2022-03-10 15:56:58.185 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:56:58.188 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:56:58.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 15:56:58.193 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:56:58.193 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-10 15:56:58.195 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:56:58.196 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:56:58.196 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:56:58.197 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:56:58.198 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:56:58.206 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:56:58.207 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:56:58.208 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:56:58.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:56:58.358 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:56:58.360 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:56:58.360 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:56:58.361 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:56:58.363 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:56:58.364 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:56:58.366 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:56:58.367 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:56:58.367 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:56:58.368 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:56:58.369 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:56:58.369 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:56:58.371 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:56:58.371 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:56:58.372 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:56:58.373 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:56:58.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:7b:13:0f:99:39:4b:44:29:6b:61:d5:d5:9f:80:4d:72:10:84:f8] modulus: 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 public exponent: 10001 ] 2022-03-10 15:57:01.581 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:57:01.582 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:57:01.583 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-10 15:57:01.584 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:57:01.585 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-10 15:57:01.585 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:57:01.586 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:57:01.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:57:01.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:57:01.587 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:57:01.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:57:01.595 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:57:01.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:57:01.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:57:01.693 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:57:01.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:57:01.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:57:01.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:57:01.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:57:01.698 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:57:01.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:01.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:01.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:01.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:01.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:01.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:01.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:01.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:01.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:01.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:57:01.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:c9:64:f6:df:9a:8c:a4:b4:1d:92:ea:4c:2b:19:97:87:78:f5:e1] modulus: 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 public exponent: 10001 ] 2022-03-10 15:57:30.279 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:57:30.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:57:30.285 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-10 15:57:30.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:57:30.286 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-10 15:57:30.287 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:57:30.288 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:57:30.288 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:57:30.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:57:30.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:57:30.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:57:30.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:57:30.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:57:30.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:57:30.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:57:30.420 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:57:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:57:30.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:57:30.423 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:57:30.424 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:57:30.424 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:30.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:30.425 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:30.426 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:30.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:30.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:30.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:57:30.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:57:30.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:57:30.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:57:30.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 9822fa1190b585e305b028fbd272456db9893fc1c355f5ba37eb8286b0109d1ae08cc8d9a33eb0aaa946ba22776ebbc7633cbc7d72c6cb8734a92bb43d74778ee987813df8661e5c856d10fc689e91438325ab64e7b3243daef7289957182a9c6819136e9a904011fee5783d217d54c9ec46831df568757535e0ea29b4d5235c943fd5d9a3ab0b07e812f3d699a03b98f944dacd8788da3407368c8a68b6b721efc3faed692d750c14202a88f0429f3a685433b27cf775bad502546272a1338d59a1ffca393c6e533652d05222977a31723bb2d8e2b0c32c547dbd4a987aa75aa6300cc359a1c60d097a4c60b34a8a6154c86ebf3bd82b9408b4b46ec05598a85442fbff409fcf851b20bb2e8aed08e3a4a67635ab4c7755c5eb0d907180b728423cfd16f84b0dbcbf25cac4f595fb5e985b61cef5d5bbf5c30bc295af8f3aa2b4a07482d5a9e794cfa5c761c5107f77fa8062899f57b7e997abd6fa872f91f5096a4f5d5c12fda7aa15e8b1de836b17892399a98dca377dec5b65b2179f6a27 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:6d:49:11:fd:ee:30:0e:b2:41:cc:9c:01:a6:80:9b:29:ef:29:5a] modulus: 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 public exponent: 10001 ] 2022-03-10 15:58:05.080 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:58:05.081 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:58:05.083 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-10 15:58:05.085 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:58:05.086 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-10 15:58:05.087 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:58:05.088 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:58:05.088 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:58:05.089 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:58:05.089 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:58:05.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:58:05.096 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:58:05.096 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:58:05.096 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:58:05.226 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:58:05.227 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:58:05.227 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:58:05.228 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:58:05.229 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:58:05.230 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:58:05.230 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:58:05.231 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:58:05.231 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:58:05.232 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:58:05.232 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:58:05.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:58:05.233 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:58:05.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:58:05.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:58:05.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:58:05.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 9822fa1190b585e305b028fbd272456db9893fc1c355f5ba37eb8286b0109d1ae08cc8d9a33eb0aaa946ba22776ebbc7633cbc7d72c6cb8734a92bb43d74778ee987813df8661e5c856d10fc689e91438325ab64e7b3243daef7289957182a9c6819136e9a904011fee5783d217d54c9ec46831df568757535e0ea29b4d5235c943fd5d9a3ab0b07e812f3d699a03b98f944dacd8788da3407368c8a68b6b721efc3faed692d750c14202a88f0429f3a685433b27cf775bad502546272a1338d59a1ffca393c6e533652d05222977a31723bb2d8e2b0c32c547dbd4a987aa75aa6300cc359a1c60d097a4c60b34a8a6154c86ebf3bd82b9408b4b46ec05598a85442fbff409fcf851b20bb2e8aed08e3a4a67635ab4c7755c5eb0d907180b728423cfd16f84b0dbcbf25cac4f595fb5e985b61cef5d5bbf5c30bc295af8f3aa2b4a07482d5a9e794cfa5c761c5107f77fa8062899f57b7e997abd6fa872f91f5096a4f5d5c12fda7aa15e8b1de836b17892399a98dca377dec5b65b2179f6a27 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:da:ea:92:3b:39:4d:65:b9:f1:1f:dc:70:27:e5:87:15:29:65:6e] modulus: ca45bdbc3f3a36d8ee32578240e504df7725062faca3262f3567b965d5458b04cb095616ff8690537b462576f7a2fcc45909e3068bc7d5b6ffe83dfa6b0f2cbd0be2b61f0c9a0d5c78fdf2a2259ee51225958bf85075eebf84f777adbea870728b82713ac79e24e12e3fc081ba3d2c48f7988b2abd4cc77d22eee58c45b081d6508a810a3fe6f954e078ace0a2278bf39e430c9763cb87d529d36eee0845ba2df33705dcc526c8ecd82b76669b16d2b57568f8b5a8d6119ec7c762456a7a2c46e29cca04606b7c0f61f95123f757e134aaf6c5d6b5e43eb6f269a6cc579903fed4bbc53f028a80928c0bd5cfcc250d7306a84d0ad2d4149b9baa9a2792e5abe3 public exponent: 10001 ] 2022-03-10 15:59:51.703 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-10 15:59:51.705 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-10 15:59:51.708 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 15:59:51.710 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-10 15:59:51.711 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-10 15:59:51.711 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-10 15:59:51.712 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-10 15:59:51.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-10 15:59:51.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-10 15:59:51.713 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-10 15:59:51.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-10 15:59:51.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:59:51.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-10 15:59:51.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:59:51.875 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-10 15:59:51.876 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-10 15:59:51.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-10 15:59:51.877 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-10 15:59:51.879 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-10 15:59:51.880 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-10 15:59:51.881 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:59:51.882 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:59:51.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:59:51.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:59:51.884 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:59:51.884 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:59:51.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-10 15:59:51.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-10 15:59:51.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-10 15:59:51.887 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-10 15:59:51.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 524393922923605876645445257287063843388082648296 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Mar 10 14:39:56 UTC 2022 Final Date: Tue Mar 09 14:39:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fe:01:bb:13:07:b1:93:b2:49:e8:62:03:36:be:21:30:c9:b1:be:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2279f73768ac957e547fe64591453d00b25487fc e855eb1f61b07e91664ec6baf00d7d9a79d85dc7 08361ab2e872b629adbe033bf8a7520e3b094e37 4d2e2d54fb633ecd8dd2962f0d4f83cf910b1202 bf93d983ceb1a33b87187514accbf1a507cce1dc 255c05949ca8fa08609ba79eb3fe9d796c650e1d 19385d315431ad9f92779a5816204b0ae1b09a02 af3088322d1e192857af5bcc20a900e0e891d7b5 69728dd9d244d2cf9d980aaf1e2e98d4f1f8f96f 1af61d70c8395a9777ba602e97425b7bd9b9cf9d 855b1dcc2c8ec97bb0de5b3a4ee4270bc45cbc3c d5c2622f7dc6e43f118dafad88e9072486f739cc 4d091ad511dd992bc017f517d8571929659c256a fcacea012bed579bd91de7e19971e92db1c638cd 1c9e4ad8a873acafaddbc5d7ec6b0872ac6ba47c aeded68796314cf716fc86149c8b768a3321b38a 333b71942b33d16147abc9f78b82881c7bbbae54 dbfe1db82431e73770b8ac6b7c39c47adfa923e6 cd11731c14ed0b4d9aa25f2c3b75dc2b9cfae1b0 f5a1972c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:a4:c3:dd:0c:dd:0b:28:26:30:0c:23:18:75:95:dd:65:ba:21:a8] modulus: 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 public exponent: 10001 ]