By type
2022-03-11 03:02:17,331 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-11 03:02:19,657 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-11 03:02:21.151 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 11, 2022 3:02:25 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 11, 2022 3:02:25 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 11, 2022 3:02:25 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 11, 2022 3:02:25 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-11 03:02:27.459 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-11 03:02:28.138 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-11 03:02:28.502 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-11 03:02:30.383 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-11 03:02:30.388 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-11 03:02:30.392 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-11 03:02:30.402 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-11 03:02:30.528 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-11 03:02:30.537 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-11 03:02:30.837 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-11 03:02:32.743 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 11, 2022 3:02:34 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-11 03:02:35.921 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 20.281 seconds (JVM running for 24.258) Mar 11, 2022 3:02:47 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-11 03:03:08.590 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 03:03:08.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 03:03:08.705 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-11 03:03:08.723 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 03:03:08.771 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-11 03:03:08.776 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 03:03:08.778 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 03:03:08.780 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 03:03:08.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 03:03:08.787 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 03:03:08.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 03:03:08.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 03:03:08.883 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 03:03:08.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 03:03:08.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 03:03:08.901 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 03:03:09.654 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 03:03:09.658 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 03:03:09.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 03:03:09.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 03:03:09.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 03:03:09.677 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 03:03:09.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 03:03:09.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 03:03:09.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 03:03:09.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 03:03:09.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 03:03:09.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 03:03:09.716 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 03:03:09.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 03:03:09.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 03:03:09.720 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 03:03:09.768 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:3a:d2:09:6c:39:5e:7a:54:8c:65:0e:ce:77:46:c1:3e:5c:74:ed] modulus: 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 public exponent: 10001 ] 2022-03-11 04:04:07.526 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:04:07.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:04:07.540 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:04:07.542 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:04:07.544 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:04:07.546 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:04:07.547 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:04:07.548 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:04:07.549 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:04:07.550 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:04:07.566 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:04:07.567 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:04:07.568 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:04:07.569 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:04:07.791 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:04:07.793 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:04:07.793 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:04:07.794 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:04:07.797 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:04:07.798 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:04:07.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:04:07.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:04:07.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:04:07.801 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:04:07.802 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:04:07.802 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:04:07.803 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:04:07.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:04:07.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:04:07.806 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:04:07.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:80:9c:a2:bc:63:bc:47:ec:8e:dc:8e:e4:1d:52:b7:cc:11:b3:e4] modulus: aa4fc74b1d4ee42b7d7f41dcd0d0027edebe73119cc8fd6fa6b9e6f47712d96043f1de11535fdb12dc4514d6cf1a30da5b84de03ec4dee2b000f016d9a622814717da8cfb43b516d42d1311a947dba2ff160e26c5cc7a1c04b854dea0bb7a7eec49a47d87162f0448246dffa6666c4f7edd3812cf1908222c7dad2a43e95002c1c675fe0b24d4374e2e30206c3d33bef523874c7b5225031761f15de3a23335b1f650ecb7731acc1c1877a213fc0327d33da12120e69c0fa29fcd10605d2a021b1dc73fcb804dbffcc6ce202747ef561c04493579fba6178e8d629d11e7457fc17a1c5b548a4ea597be21ce177ef9b258a9ad39c2b74a9c4cbc6f971d56292e3 public exponent: 10001 ] 2022-03-11 04:05:18.069 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:05:18.070 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:05:18.072 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:05:18.073 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:05:18.074 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:05:18.075 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:05:18.075 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:05:18.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:05:18.077 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:05:18.079 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:05:18.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:05:18.093 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:05:18.094 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:05:18.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:05:18.286 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:05:18.287 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:05:18.289 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:05:18.290 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:05:18.297 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:05:18.299 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:05:18.300 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:05:18.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:05:18.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:05:18.304 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:05:18.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:05:18.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:05:18.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:05:18.312 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:05:18.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:05:18.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:05:18.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:a1:c6:05:57:d7:fb:21:a9:9b:19:33:31:d8:f9:4d:a4:49:57:e6] modulus: aaf2f5b13f6cfc7693f1ef2cd32b136dac7f39cedb9944c24a624b3be82549f726cb62a8245cc0fdf754df715bbb1cc463d5e0f44693829203181ba4bea05c2a1df83848eefd2c53c80665c599848b9e142ff7ad6dbbd266fa1c9077c4314c372c2c20ca9205fea3a68cb26f2138e6dacad6ffdbac050ff6105f361c524d44d035faf7574e3131727edcecbf3a056ab8ca6fe3b9e5b5d33a03117bf9127ff0ffa89a1d74eadd68c9108f90cd45ca45b032efffdbbb99645cc38bb2306a21aa77cbf4c7aecf9d0f6e90173c476ac92e2fd896be4081cb1c9982bc574d922fae42d00b49b25976330bb0bb789e3162d9f73b3b1534362985dd5c0b19b4546275cb public exponent: 10001 ] 2022-03-11 04:06:48.255 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:06:48.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:06:48.261 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:06:48.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:06:48.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:06:48.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:06:48.267 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:06:48.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:06:48.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:06:48.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:06:48.279 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:06:48.281 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:06:48.282 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:06:48.282 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:06:48.463 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:06:48.464 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:06:48.464 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:06:48.465 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:06:48.469 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:06:48.470 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:06:48.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:06:48.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:06:48.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:06:48.472 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:06:48.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:06:48.473 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:06:48.474 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:06:48.475 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:06:48.476 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:06:48.477 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:06:48.484 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:e4:ad:8a:8b:95:92:2b:51:a6:cf:97:61:d6:4d:64:81:28:93:0b] modulus: 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 public exponent: 10001 ] 2022-03-11 04:08:13.918 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:08:13.923 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:08:13.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:08:13.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:08:13.943 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:08:13.952 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:08:13.954 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:08:13.956 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:08:13.956 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:08:13.957 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:08:13.973 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:08:13.975 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:13.975 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:13.976 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:14.134 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:08:14.135 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:08:14.136 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:08:14.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:14.148 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:08:14.149 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:08:14.150 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:14.150 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:14.161 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:14.163 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:14.164 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:14.174 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:14.181 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:14.185 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:14.187 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:14.188 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:08:14.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:d6:aa:ad:30:4c:58:0d:2c:89:71:1d:b6:e0:69:2b:85:d7:15:58] modulus: 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 public exponent: 10001 ] 2022-03-11 04:08:41.617 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:08:41.619 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:08:41.621 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:08:41.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:08:41.623 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:08:41.625 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:08:41.626 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:08:41.628 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:08:41.629 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:08:41.630 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:08:41.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:08:41.647 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:41.648 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:41.648 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:41.810 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:08:41.811 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:08:41.812 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:08:41.812 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:41.814 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:08:41.815 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:08:41.816 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:41.816 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:41.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:41.818 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:41.818 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:41.819 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:41.820 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:41.820 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:41.821 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:41.822 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:08:41.827 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: ac21a2fb80b8794d21e7422bbfa2e13b05f8e295191e29cb17d7096dc69f3f22bf27764f50b968f680d996b43fa84ca41fccc5dd13f3d836ec9b82f6657d12c6815877109e814ef4731ba074da14bff64d94f34cf92eb9ce8e34b3741d362d1cabe688e8dd823bd6d73eb653d969735ed7c6c5379a8b5452d1c8be96bc1047f657372033f322f88e99f2c017d12fe37204a815be9823372e74462b1de9de2e28bd63ac2eb109a56c89363d6d042888958839a69407e5e458c1b586ec161e0765415e56bf8c98a5928ee7df33959560aaf31167dfeae784ff883dfe8250b0d744a633976a05da78d1e01725d5b046afa1084fa8ff502fdaeeb5fcb33653cabf49601c91909c1ed1acf19cc59bac689b47c69b59460488f75be633554705077356d1d03bf982a74c65cb4493e3748a2598aab4ae89bce3d1d906ad383134a926bf51c964e7afb015fb9e7525ed1ee7ed2225a56050b4d748b71bf172655e70457adb5bdd3972a50ad1578c812f8e877a3b4317c8c1421659dc92bab1c4c93fe19b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:b9:ba:22:e1:2d:3c:9d:a1:5e:de:23:c9:da:e7:3d:58:53:cb:c8] modulus: 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 public exponent: 10001 ] 2022-03-11 04:08:46.339 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:08:46.341 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:08:46.344 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-11 04:08:46.345 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:08:46.346 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-11 04:08:46.347 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:08:46.347 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:08:46.348 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:08:46.349 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:08:46.349 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:08:46.358 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:08:46.359 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:46.360 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:08:46.360 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:46.506 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:08:46.507 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:08:46.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:08:46.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:08:46.511 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:08:46.512 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:08:46.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:46.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:46.513 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:46.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:46.521 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:46.522 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:46.523 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:08:46.524 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:08:46.524 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:08:46.525 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:08:46.530 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:9c:e8:38:eb:35:5c:11:bb:76:67:b2:cc:8d:10:b7:75:70:ba:17] modulus: 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 public exponent: 10001 ] 2022-03-11 04:09:21.342 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:09:21.344 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:09:21.345 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-11 04:09:21.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:09:21.347 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-11 04:09:21.347 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:09:21.348 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:09:21.348 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:09:21.349 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:09:21.349 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:09:21.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:09:21.365 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:09:21.365 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:09:21.366 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:09:21.499 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:09:21.501 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:09:21.501 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:09:21.502 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:09:21.505 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:09:21.505 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:09:21.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:09:21.506 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:09:21.507 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:09:21.509 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:09:21.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:09:21.510 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:09:21.512 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:09:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:09:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:09:21.515 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:09:21.521 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:37:f5:36:c0:a0:c8:f9:1d:c1:b0:ba:ee:f9:e6:28:37:c3:36:28] modulus: a1736f40c8b77f36b12fda474326c3ec9c856867f4489efa14854d1318bdf34cafb2f26d4134f1b2627c478b35a9ee034a905f0bf01dcc47b52c5b3ae82eedfa14c1f2e8f0b816f3cfaa352520d9974c5e5cba1c01c2982ff9830cdf47a809b85cc86b8673a86fc691326a4ee10326e828ef3106e5b67a61542d8532ae3a2645e50b91637b828718ce362bff2e337d0c6e034bb4adcb7863473ed14970906817aecb654da0183038500fafe17f00b20641524287db607836b2b6a36b4ba1664000ce358ea35905ce85059c3f70ad426f43b2fa196bef94bc4a0e0ebf54c4f4677bbdd97c882f3b18230ca2a8cfa0859d7bdf325259b35268a56caf03ae4a1ef1 public exponent: 10001 ] 2022-03-11 04:11:07.505 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:11:07.510 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:11:07.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:11:07.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:11:07.513 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:11:07.513 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:11:07.514 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:11:07.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:11:07.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:11:07.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:11:07.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:11:07.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:11:07.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:11:07.521 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:11:07.685 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:11:07.686 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:11:07.686 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:11:07.687 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:11:07.690 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:11:07.690 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:11:07.691 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:11:07.691 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:11:07.691 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:11:07.692 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:11:07.692 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:11:07.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:11:07.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:11:07.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:11:07.694 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:11:07.695 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:11:07.700 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:ba:4b:f3:e6:c5:97:6b:a4:f5:f7:2a:54:a7:a5:5b:53:8c:ca:c4] modulus: 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 public exponent: 10001 ] 2022-03-11 04:12:33.375 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:12:33.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:12:33.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:12:33.391 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:12:33.393 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:12:33.395 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:12:33.396 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:12:33.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:12:33.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:12:33.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:12:33.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:12:33.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:12:33.431 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:12:33.431 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:12:33.648 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:12:33.649 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:12:33.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:12:33.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:12:33.652 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:12:33.653 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:12:33.654 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:12:33.654 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:12:33.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:12:33.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:12:33.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:12:33.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:12:33.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:12:33.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:12:33.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:12:33.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:12:33.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:ff:5a:b7:5b:6f:81:a0:43:d5:dc:2f:70:67:92:da:2b:51:40:69] modulus: ed05449ac1d4992c15f19002c2983bb39019ce9fec75710aa053592b97c88f4db86fbff72a9cd3ae9602a0ceadb129bd24f7838fac80222164441286852fdb03a4a714c28c3ab618bda43f34053df57c7de0af410a84b5503380edf0366d6f27125ebad654c77ee20fc1055e3e575bf3a0e0f90b014858a2906e4c748c15b88f7982ba9e4aba37ba3546f4d1e95144c515b031082417fc79ddb4dc6b430afd766af49a275c471cd6bce6637c4477dc4d6dcb359764dc7cf1a334e9c4eea1326e553fc946bfd4f38f4e9ade4c9669cd2d230e2ec985f954afee9f61158001a2cd72277bec05ede165dbb0df3d74bc1537ed4b97036357aceb15d29bda88f88c5b public exponent: 10001 ] 2022-03-11 04:13:45.625 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:13:45.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:13:45.636 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:13:45.637 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:13:45.637 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:13:45.638 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:13:45.638 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:13:45.638 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:13:45.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:13:45.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:13:45.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:13:45.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:13:45.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:13:45.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:13:45.790 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:13:45.790 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:13:45.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:13:45.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:13:45.793 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:13:45.793 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:13:45.793 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:13:45.793 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:13:45.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:13:45.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:13:45.794 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:13:45.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:13:45.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:13:45.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:13:45.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:13:45.797 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:13:45.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: ac21a2fb80b8794d21e7422bbfa2e13b05f8e295191e29cb17d7096dc69f3f22bf27764f50b968f680d996b43fa84ca41fccc5dd13f3d836ec9b82f6657d12c6815877109e814ef4731ba074da14bff64d94f34cf92eb9ce8e34b3741d362d1cabe688e8dd823bd6d73eb653d969735ed7c6c5379a8b5452d1c8be96bc1047f657372033f322f88e99f2c017d12fe37204a815be9823372e74462b1de9de2e28bd63ac2eb109a56c89363d6d042888958839a69407e5e458c1b586ec161e0765415e56bf8c98a5928ee7df33959560aaf31167dfeae784ff883dfe8250b0d744a633976a05da78d1e01725d5b046afa1084fa8ff502fdaeeb5fcb33653cabf49601c91909c1ed1acf19cc59bac689b47c69b59460488f75be633554705077356d1d03bf982a74c65cb4493e3748a2598aab4ae89bce3d1d906ad383134a926bf51c964e7afb015fb9e7525ed1ee7ed2225a56050b4d748b71bf172655e70457adb5bdd3972a50ad1578c812f8e877a3b4317c8c1421659dc92bab1c4c93fe19b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:f3:bc:73:13:1a:f3:67:ea:4e:80:fc:49:07:df:52:c5:40:15:3b] modulus: 9fa8d786483429880578793142e1239747493f7a99b36947e5f7996f90a6f52dc3b68035e0aae1f13aabdc2a190cd3fa5bc6fbf26bf71d76580f06a0069662b02a5d59eb475eb841ee64696e0a17624f8e69106647889e2ce484531527fef4f294c64d99e40d7f4c8ad8cd04f7ac4d701f7d690196b6fbd993048d9797a7c77c62602cbb8547f678be441351f205be8229b61059fc6d4934c0acd05b068c4029e0c9830862ff6f480ce2b8b24dd4ced60338683bce3439ee16503a0f78a5093a746777256422a68d24bff84d6e015075ea4967f0d16dfda85a2d1cc791c7a08871bbf9c3d1cfd447eb35d990ff3fd95fc866d9203e3c0b4c7d1f3e4975ed4d4d public exponent: 10001 ] 2022-03-11 04:15:18.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:15:18.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:15:18.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:15:18.157 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:15:18.157 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:15:18.159 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:15:18.159 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:15:18.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:15:18.160 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:15:18.161 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:15:18.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:15:18.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:15:18.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:15:18.170 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:15:18.326 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:15:18.327 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:15:18.328 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:15:18.328 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:15:18.330 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:15:18.331 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:15:18.331 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:18.332 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:18.332 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:18.333 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:18.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:18.335 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:18.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:18.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:18.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:18.339 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:15:18.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:69:cc:18:d4:17:7a:d8:da:46:9d:dc:3e:7e:95:0c:2a:75:69:85] modulus: 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 public exponent: 10001 ] 2022-03-11 04:15:21.629 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:15:21.630 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:15:21.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:15:21.633 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:15:21.633 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:15:21.634 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:15:21.635 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:15:21.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:15:21.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:15:21.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:15:21.641 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:15:21.642 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:15:21.642 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:15:21.642 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:15:21.791 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:15:21.792 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:15:21.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:15:21.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:15:21.796 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:15:21.797 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:15:21.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:21.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:21.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:21.801 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:21.802 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:15:21.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:15:21.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:15:21.804 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:15:21.810 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: ac21a2fb80b8794d21e7422bbfa2e13b05f8e295191e29cb17d7096dc69f3f22bf27764f50b968f680d996b43fa84ca41fccc5dd13f3d836ec9b82f6657d12c6815877109e814ef4731ba074da14bff64d94f34cf92eb9ce8e34b3741d362d1cabe688e8dd823bd6d73eb653d969735ed7c6c5379a8b5452d1c8be96bc1047f657372033f322f88e99f2c017d12fe37204a815be9823372e74462b1de9de2e28bd63ac2eb109a56c89363d6d042888958839a69407e5e458c1b586ec161e0765415e56bf8c98a5928ee7df33959560aaf31167dfeae784ff883dfe8250b0d744a633976a05da78d1e01725d5b046afa1084fa8ff502fdaeeb5fcb33653cabf49601c91909c1ed1acf19cc59bac689b47c69b59460488f75be633554705077356d1d03bf982a74c65cb4493e3748a2598aab4ae89bce3d1d906ad383134a926bf51c964e7afb015fb9e7525ed1ee7ed2225a56050b4d748b71bf172655e70457adb5bdd3972a50ad1578c812f8e877a3b4317c8c1421659dc92bab1c4c93fe19b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:2b:95:a2:17:5e:f6:82:db:40:49:54:48:51:4e:2a:62:b2:9c:1a] modulus: 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 public exponent: 10001 ] 2022-03-11 04:18:28.452 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:18:28.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:18:28.467 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:18:28.471 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:18:28.471 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:18:28.473 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:18:28.473 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:18:28.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:18:28.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:18:28.475 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:18:28.485 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:18:28.487 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:18:28.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:18:28.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:18:28.659 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:18:28.662 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:18:28.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:18:28.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:18:28.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:18:28.666 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:18:28.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:18:28.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:18:28.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:18:28.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:18:28.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:18:28.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:18:28.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:18:28.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:18:28.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:18:28.673 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:18:28.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:fb:94:c5:ea:64:40:a0:d2:97:2e:f2:0c:e9:a4:ee:f0:f5:04:ef] modulus: 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 public exponent: 10001 ] 2022-03-11 04:19:41.039 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:19:41.041 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:19:41.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:19:41.045 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:19:41.045 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:19:41.051 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:19:41.052 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:19:41.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:19:41.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:19:41.058 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:19:41.063 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:19:41.064 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:19:41.065 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:19:41.065 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:19:41.249 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:19:41.251 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:19:41.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:19:41.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:19:41.253 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:19:41.253 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:19:41.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:19:41.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:19:41.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:19:41.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:19:41.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:19:41.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:19:41.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:19:41.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:19:41.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:19:41.257 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:19:41.260 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:ca:cd:55:a9:f7:ff:9e:dd:6f:5d:5d:1e:49:80:8d:6f:4a:5b:98] modulus: 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 public exponent: 10001 ] 2022-03-11 04:21:15.074 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:21:15.077 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:21:15.079 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:21:15.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:21:15.084 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-11 04:21:15.085 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:21:15.086 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:21:15.107 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:21:15.107 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:21:15.108 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:21:15.120 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:21:15.124 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:21:15.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:21:15.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:21:15.269 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:21:15.270 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:21:15.270 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:21:15.271 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:21:15.272 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:21:15.273 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:21:15.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:15.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:15.273 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:15.274 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:15.274 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:15.274 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:15.275 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:15.275 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:15.275 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:15.276 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:21:15.286 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:01:72:b3:94:6b:30:a3:98:92:92:de:10:d9:4e:34:27:71:38:7b] modulus: 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 public exponent: 10001 ] 2022-03-11 04:21:29.251 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:21:29.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:21:29.255 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:21:29.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:21:29.263 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:21:29.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:21:29.264 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:21:29.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:21:29.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:21:29.265 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:21:29.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:21:29.271 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:21:29.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:21:29.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:21:29.427 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:21:29.429 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:21:29.429 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:21:29.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:21:29.432 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:21:29.432 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:21:29.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:29.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:29.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:29.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:29.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:29.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:29.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:21:29.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:21:29.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:21:29.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:21:29.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:6e:5e:4c:0f:e5:7e:52:1d:e1:e6:3f:57:7d:1c:31:99:9f:63:c6] modulus: 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 public exponent: 10001 ] 2022-03-11 04:25:19.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:25:19.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:25:19.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:25:19.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:25:19.639 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-11 04:25:19.644 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:25:19.646 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:25:19.646 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:25:19.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:25:19.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:25:19.657 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:25:19.665 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:25:19.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:25:19.667 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:25:19.866 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:25:19.867 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:25:19.869 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:25:19.870 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:25:19.874 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:25:19.877 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:25:19.878 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:19.878 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:19.879 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:19.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:19.881 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:19.881 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:19.882 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:19.882 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:19.883 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:19.884 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:25:19.890 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:c4:4c:48:39:3b:9e:90:2a:da:72:b3:10:02:1e:0c:98:ae:67:2b] modulus: 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 public exponent: 10001 ] 2022-03-11 04:25:52.211 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:25:52.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:25:52.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-11 04:25:52.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:25:52.216 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-11 04:25:52.217 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:25:52.217 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:25:52.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:25:52.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:25:52.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:25:52.230 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:25:52.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:25:52.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:25:52.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:25:52.434 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:25:52.435 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:25:52.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:25:52.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:25:52.439 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:25:52.440 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:25:52.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:52.441 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:52.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:52.443 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:52.445 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:25:52.445 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:25:52.446 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:25:52.447 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:25:52.452 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:6f:0e:8b:b4:f2:b5:26:9f:64:d5:49:2e:22:be:f0:b2:fa:32:15] modulus: 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 public exponent: 10001 ] 2022-03-11 04:26:20.558 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:26:20.559 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:26:20.578 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:26:20.579 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:26:20.584 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:26:20.588 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:26:20.589 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:26:20.590 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:26:20.590 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:26:20.591 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:26:20.599 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:26:20.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:26:20.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:26:20.602 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:26:20.741 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:26:20.742 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:26:20.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:26:20.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:26:20.752 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:26:20.753 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:26:20.754 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:20.754 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:20.760 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:20.762 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:20.762 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:20.763 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:20.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:20.766 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:20.766 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:20.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:26:20.774 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:6b:9c:f8:d1:7f:ee:d4:db:81:3d:09:76:ed:4d:9f:33:83:66:6b] modulus: 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 public exponent: 10001 ] 2022-03-11 04:26:24.806 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:26:24.812 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:26:24.814 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-11 04:26:24.816 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:26:24.816 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-11 04:26:24.817 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:26:24.817 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:26:24.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:26:24.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:26:24.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:26:24.826 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:26:24.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:26:24.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:26:24.828 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:26:24.947 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:26:24.948 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:26:24.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:26:24.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:26:24.951 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:26:24.952 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:26:24.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:24.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:24.953 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:24.954 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:24.954 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:24.954 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:24.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:26:24.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:26:24.955 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:26:24.957 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:26:24.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: ac21a2fb80b8794d21e7422bbfa2e13b05f8e295191e29cb17d7096dc69f3f22bf27764f50b968f680d996b43fa84ca41fccc5dd13f3d836ec9b82f6657d12c6815877109e814ef4731ba074da14bff64d94f34cf92eb9ce8e34b3741d362d1cabe688e8dd823bd6d73eb653d969735ed7c6c5379a8b5452d1c8be96bc1047f657372033f322f88e99f2c017d12fe37204a815be9823372e74462b1de9de2e28bd63ac2eb109a56c89363d6d042888958839a69407e5e458c1b586ec161e0765415e56bf8c98a5928ee7df33959560aaf31167dfeae784ff883dfe8250b0d744a633976a05da78d1e01725d5b046afa1084fa8ff502fdaeeb5fcb33653cabf49601c91909c1ed1acf19cc59bac689b47c69b59460488f75be633554705077356d1d03bf982a74c65cb4493e3748a2598aab4ae89bce3d1d906ad383134a926bf51c964e7afb015fb9e7525ed1ee7ed2225a56050b4d748b71bf172655e70457adb5bdd3972a50ad1578c812f8e877a3b4317c8c1421659dc92bab1c4c93fe19b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:88:53:02:1c:b6:68:64:f2:fc:2b:9f:77:54:46:cf:93:1d:89:43] modulus: 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 public exponent: 10001 ] 2022-03-11 04:28:13.385 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:28:13.386 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:28:13.388 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:28:13.391 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:28:13.391 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-11 04:28:13.392 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:28:13.393 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:28:13.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:28:13.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:28:13.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:28:13.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:28:13.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:28:13.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:28:13.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:28:13.527 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:28:13.528 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:28:13.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:28:13.529 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:28:13.532 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:28:13.532 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:28:13.533 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:28:13.533 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:28:13.533 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:28:13.534 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:28:13.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:28:13.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:28:13.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:28:13.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:28:13.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:28:13.537 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:28:13.546 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:b8:0d:8f:89:da:9e:c6:8b:a5:90:3d:3f:15:45:99:49:09:6b:64] modulus: e9ff253038966d77176601044b29f54f37e264493bd43b8a7fa89de9b34ca8d57c5d7c7a4bc26d9ad285ab935375ce99905fb8a2d482e2134c1c7408908c433c8da1be3fa31c2009db8af3d8c6ef723ac12b5ee8791658498e3c6e6b0ab1e73d7c679c70b56865493069633f51a5494082abc471d40f1f8d2eb0542b58b621f30b404905654f22eee575ef4ee5e1e68be1ebbb5478335d52f379e4d330bee52980d4723280ee2ca442b7e0499a790168fb81f33aaf26d86a3ba55031ca60fc690ae85fc5a84d7045aa55ccc0b69bd604834dae6c523db7ad99b0fbab61bc6be5c05f4179aa68039b5b47b98aaedc9194e38762d33dff7d195158e870b6d6d817 public exponent: 10001 ] 2022-03-11 04:31:28.072 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-11 04:31:28.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-11 04:31:28.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:31:28.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-11 04:31:28.080 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-11 04:31:28.081 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-11 04:31:28.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-11 04:31:28.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-11 04:31:28.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-11 04:31:28.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-11 04:31:28.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-11 04:31:28.096 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:31:28.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-11 04:31:28.097 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:31:28.322 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-11 04:31:28.323 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-11 04:31:28.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-11 04:31:28.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-11 04:31:28.325 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-11 04:31:28.325 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-11 04:31:28.325 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:31:28.326 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:31:28.326 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:31:28.326 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:31:28.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:31:28.327 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:31:28.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-11 04:31:28.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-11 04:31:28.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-11 04:31:28.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-11 04:31:28.333 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 359064668668278582905229025398945151033620014140 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Mar 11 02:58:40 UTC 2022 Final Date: Wed Mar 10 02:58:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:49:e4:6b:3e:94:b3:ec:59:a0:50:9c:5f:92:76:21:7d:6a:06:89] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6a313f3106a24060390bfaf2c01df2793d97e054 2b7689452b8b348e53e596a6305c099d9cc8b51e dbdbf9bea2894757390fc3fdb98ba4a6b035cace f56c70bdda6c449d5924aff0e9a8c8ce0d67efdc 4cf73287b1e2670b17d19973ba056e6972ce8a9d 2a46549765be2ed301d73c47ee0b0d333ff9ca6b 22d94b517a500836f68d75385f21eb72d61e44ae 833435da485388ea8c2811bd77d2edaffd068dbe c154fb4e3a7b2d8ca3c10f41dd35dd8f6d985f26 09b6727478d44ad1a278dbe758c7280e6e3e4878 214b1f60819d171de55445c61c1823b447901c83 47e7235fc4ad49fb89062c3d20e30eafadfecbc9 f03c8d3671996d27117aec7aa5313ba29c9d28d9 aa5a206a3b78fcf045d215957c3294c1f94ca059 d94d71b3608305e4b1994586780281e5d8a72a9a 57d5c90abab3473b3be365bee50cd81142675679 5cfcf2c066e878deb32da11394ac5d36b540a1b1 3cb4d3f8afd93448d11bf8cc461154c0a5e4ba9a 18f2f63b5b90a223e0572f336446bd43c13858ba ac823156 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:82:b5:fe:fa:40:8a:c7:92:41:69:c4:7d:d8:80:8b:f0:4c:31:76] modulus: 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 public exponent: 10001 ]