By type
2022-03-12 02:55:34,385 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-12 02:55:36,186 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-12 02:55:37.184 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 12, 2022 2:55:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-12 02:55:40.606 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-12 02:55:40.952 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-12 02:55:41.175 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-12 02:55:42.130 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-12 02:55:42.133 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-12 02:55:42.134 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-12 02:55:42.138 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-12 02:55:42.201 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-12 02:55:42.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-12 02:55:42.338 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-12 02:55:43.122 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 12, 2022 2:55:44 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-12 02:55:44.449 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.528 seconds (JVM running for 13.894) Mar 12, 2022 2:56:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-12 02:56:23.706 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 02:56:23.713 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 02:56:23.763 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-12 02:56:23.772 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 02:56:23.789 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-12 02:56:23.792 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 02:56:23.793 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 02:56:23.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 02:56:23.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 02:56:23.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 02:56:23.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 02:56:23.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 02:56:23.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 02:56:23.857 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 02:56:23.857 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 02:56:23.861 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 02:56:24.544 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 02:56:24.550 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 02:56:24.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 02:56:24.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 02:56:24.563 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 02:56:24.564 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 02:56:24.565 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.565 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.577 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.578 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.578 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.584 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.587 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 02:56:24.616 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:08:47:81:bd:a8:e9:ba:9c:3e:55:ae:e6:60:66:49:6b:86:21:4c] modulus: a773beae5c4d7a06549816b73f79039c39dc1bb2d468ad5f294e6524ba8206a55098ca04573c4b5c7ddae69fb0ed6ee1f57b38d17e271b36a0efed8c481bb18a5a57557cf86d30b7ca49bae0ba84737e8d22e6fb5f27220d4911640211b54ebd16371e04896ed787a4929694c0b517fbdca98ca9bbf53e78b6504db03e0ef4689891de62b55315a3f67ff09b4951c2b2047a14f0f5bf326e0b831941891aac7a3da81f07d29a0c83b8b72c0097b967f506617e29c0cce30e4e908fe6a19b47d167b1daf1eb48894a3666f4dd6f10862db2293536d05d20adb2b332664f4047a586d3279fb37bcf27e1f1ce3fc1e7e533cda333c22cd6ea5ec9ed7bf9a37c2acd public exponent: 10001 ] 2022-03-12 03:59:39.732 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 03:59:39.736 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 03:59:39.739 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 03:59:39.741 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 03:59:39.741 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 03:59:39.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 03:59:39.743 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 03:59:39.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 03:59:39.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 03:59:39.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 03:59:39.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 03:59:39.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 03:59:39.766 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 03:59:39.766 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 03:59:40.065 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 03:59:40.067 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 03:59:40.067 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 03:59:40.068 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 03:59:40.072 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 03:59:40.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 03:59:40.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.075 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 03:59:40.100 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:aa:0b:b7:8b:ed:e3:e9:84:30:e8:79:46:4b:06:d6:fe:95:50:81] modulus: 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 public exponent: 10001 ] 2022-03-12 04:00:54.380 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:00:54.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:00:54.383 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:00:54.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:00:54.384 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:00:54.385 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:00:54.386 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:00:54.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:00:54.387 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:00:54.387 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:00:54.396 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:00:54.397 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:00:54.397 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:00:54.398 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:00:54.578 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:00:54.579 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:00:54.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:00:54.580 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:00:54.587 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:00:54.587 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:00:54.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.591 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.591 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.591 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.592 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.593 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.593 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.595 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:00:54.601 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:ee:f6:fd:50:98:8d:30:47:63:ec:32:0a:c8:a7:04:c4:ac:45:41] modulus: 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 public exponent: 10001 ] 2022-03-12 04:02:26.761 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:02:26.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:02:26.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:02:26.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:02:26.770 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:02:26.771 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:02:26.772 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:02:26.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:02:26.772 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:02:26.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:02:26.778 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:02:26.780 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:02:26.780 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:02:26.780 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:02:26.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:02:26.924 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:02:26.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:02:26.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:02:26.927 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:02:26.928 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:02:26.928 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.929 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:02:26.939 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: d9ce10c46970bade901dad34db1772d2d1aba9636a9b41c8524311b514f387b3bed71daa1e697c068c0c63ebfd5d52a278a2e9e8c15e86ca7ab02fb91e2b527bb68f1d7f9f669890c68d1c86dc71e5a92f7ba02f7e31334a592714ecdf98da00a533c9b4f27b44b52a4a2a241d9c6bec0c13ba009e5663cbf7c3c864c24be7818d98f607a6e07da1df1e10ce0d3760a60d933096cdea0e6589ed9be3de415c78e6025ca3417608041103a300511ea1a703543a5f071677f7972fc956fa6841f325d7aef8eacf35fc65d764cbb1efbc599c25b16d6fd463db37571be6ec80c3e1b7e146eed2ac5a81a574c8e5a2c5ea40592bacdc5951ff2f00cdb47bc3498d2d651ae8e11023dcde41509d015b9731ede088a7cae00f28cd2fbe0f24bc840136a7825c49f1bc0387dab94bd6497dfc76d437fcc85931255c3b5c0feffc673c9049d06e28358997510040d387f52da78671a81fe66d0e7c25672e68b783cd6281aad42a80a3da98a39058b7cea6950b2018c2f38efa31f1fb4002fe2b73b357ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:29:d3:97:92:02:b3:ba:e4:46:bc:2c:9a:5f:38:d3:f8:c6:5b:c6] modulus: b8a02b7444a0763493d3fda0194bf6ed3419d11e6206550d8b3b89882a1216957bec2ae4547c5467381e0542d1ace88b54a344103d6ae92d554fb80062c64a3fb45d585914dde3f7b1ba48de5cbd69bb0b745dee7d0ef680569d9e77f7188f941db56ceba4bb24eb710a6f36828197b33ea662d89b199741401fb7b6a6ff65a57d89792602ac4f4a613b2c63a1f36613c8e1900e7a5ad6720dad5ac1ac6d28fc0e6eaa0179f377d0d4e9fe625ce7c9e1f5408c5bec5299df664353a61fbde4d1c3544af3296c977403b6546ab084c263c2307994db7f83bd19c6b5df6c58aede2d70f5b1430a99417fcfdba91b79b045ed828f752aa39f23c89f6c1a5c5adbcb public exponent: 10001 ] 2022-03-12 04:04:10.047 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:04:10.048 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:04:10.050 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:04:10.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:10.051 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:04:10.052 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:10.052 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:04:10.053 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:04:10.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:10.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:04:10.059 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:04:10.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:10.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:10.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:10.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:04:10.204 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:04:10.204 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:04:10.205 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:10.207 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:04:10.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:10.208 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:10.218 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:7c:9d:78:92:76:2a:7e:a9:b1:67:67:89:68:87:f0:17:31:43:e8] modulus: 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 public exponent: 10001 ] 2022-03-12 04:04:19.725 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:04:19.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:04:19.727 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-12 04:04:19.728 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:19.728 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-12 04:04:19.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:19.729 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:04:19.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:04:19.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:19.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:04:19.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:04:19.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:19.737 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:19.737 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:19.943 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:04:19.944 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:04:19.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:04:19.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:19.949 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:04:19.950 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:19.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.956 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:19.962 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:ec:f4:1e:43:f9:5c:12:39:c1:71:4f:68:39:ab:d6:39:7f:54:d0] modulus: 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 public exponent: 10001 ] 2022-03-12 04:04:42.345 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:04:42.354 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:04:42.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:04:42.359 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:42.359 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:04:42.360 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:42.363 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:04:42.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:04:42.364 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:42.364 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:04:42.369 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:04:42.370 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:42.370 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:04:42.370 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:42.487 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:04:42.488 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:04:42.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:04:42.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:42.490 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:04:42.490 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:42.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.492 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.492 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.493 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.495 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.496 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:42.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:2e:79:8c:82:ab:22:b3:ef:fc:4b:98:70:7c:08:52:09:1c:d7:76] modulus: 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 public exponent: 10001 ] 2022-03-12 04:05:17.426 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:05:17.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:05:17.429 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:05:17.429 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:05:17.430 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:05:17.431 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:05:17.431 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:05:17.431 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:05:17.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:05:17.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:05:17.440 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:05:17.440 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:05:17.441 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:05:17.441 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:05:17.586 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:05:17.587 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:05:17.587 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:05:17.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:05:17.589 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:05:17.590 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:05:17.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.590 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.591 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.592 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.593 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.594 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.595 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:05:17.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:5a:9d:ea:2d:b0:46:c0:1a:2d:bc:57:0d:d5:39:bf:60:9f:5e:d7] modulus: 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 public exponent: 10001 ] 2022-03-12 04:07:04.070 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:07:04.071 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:07:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:07:04.075 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:07:04.075 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:07:04.076 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:07:04.076 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:07:04.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:07:04.077 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:07:04.078 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:07:04.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:07:04.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:07:04.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:07:04.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:07:04.210 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:07:04.212 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:07:04.212 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:07:04.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:07:04.214 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:07:04.214 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:07:04.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.215 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:07:04.222 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:a3:0e:ed:c7:39:01:b9:6b:19:d0:ba:63:f4:63:e6:bc:de:c8:17] modulus: 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 public exponent: 10001 ] 2022-03-12 04:17:59.524 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:17:59.527 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:17:59.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:17:59.532 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:17:59.532 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:17:59.534 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:17:59.534 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:17:59.535 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:17:59.536 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:17:59.537 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:17:59.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:17:59.546 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:17:59.547 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:17:59.547 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:17:59.743 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:17:59.744 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:17:59.744 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:17:59.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:17:59.746 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:17:59.747 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:17:59.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.749 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.749 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.751 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:17:59.755 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:46:f6:9e:b0:88:cb:77:97:b9:6a:fe:f4:79:bf:94:b7:47:da:b4] modulus: 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 public exponent: 10001 ] 2022-03-12 04:22:08.405 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:22:08.408 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:22:08.411 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:22:08.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:22:08.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:22:08.413 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:22:08.414 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:22:08.414 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:22:08.415 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:22:08.415 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:22:08.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:22:08.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:22:08.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:22:08.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:08.568 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:22:08.569 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:22:08.569 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:22:08.570 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:08.571 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:22:08.572 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:22:08.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.573 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.575 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.575 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.576 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.576 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.577 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:22:08.582 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: d9ce10c46970bade901dad34db1772d2d1aba9636a9b41c8524311b514f387b3bed71daa1e697c068c0c63ebfd5d52a278a2e9e8c15e86ca7ab02fb91e2b527bb68f1d7f9f669890c68d1c86dc71e5a92f7ba02f7e31334a592714ecdf98da00a533c9b4f27b44b52a4a2a241d9c6bec0c13ba009e5663cbf7c3c864c24be7818d98f607a6e07da1df1e10ce0d3760a60d933096cdea0e6589ed9be3de415c78e6025ca3417608041103a300511ea1a703543a5f071677f7972fc956fa6841f325d7aef8eacf35fc65d764cbb1efbc599c25b16d6fd463db37571be6ec80c3e1b7e146eed2ac5a81a574c8e5a2c5ea40592bacdc5951ff2f00cdb47bc3498d2d651ae8e11023dcde41509d015b9731ede088a7cae00f28cd2fbe0f24bc840136a7825c49f1bc0387dab94bd6497dfc76d437fcc85931255c3b5c0feffc673c9049d06e28358997510040d387f52da78671a81fe66d0e7c25672e68b783cd6281aad42a80a3da98a39058b7cea6950b2018c2f38efa31f1fb4002fe2b73b357ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:ac:d2:64:89:be:34:a5:b9:f1:fa:da:9a:ce:d6:e0:90:9d:d1:03] modulus: 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 public exponent: 10001 ] 2022-03-12 04:22:41.304 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:22:41.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:22:41.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:22:41.307 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:22:41.308 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:22:41.308 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:22:41.309 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:22:41.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:22:41.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:22:41.309 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:22:41.314 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:22:41.315 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:22:41.315 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:22:41.315 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:41.442 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:22:41.443 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:22:41.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:22:41.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:41.445 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:22:41.445 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:22:41.472 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.474 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.474 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.476 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.477 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.478 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:22:41.482 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:bd:60:f6:ee:a1:53:b1:ae:4d:f5:ca:da:40:0f:02:b2:55:db:4e] modulus: cc2ab6b8d4afaa616cc8a6c438c0eab18dbd3fec3e2040db74af890e851f63896aedfdf67b761f71eca29e071270b2c998c9b37f903eba1cb7a0ccfc625f3dbc94da770e21206b0fb14a8aa732243253081dff474415a3eefc981e9fd780934a9670b723304b0f0334804e239a8dfba7e2ce34443040ed2088fdf28fff4ef2e92dbed6b915acc71cbcafda4627460baab0b5e2b055404d228250b895e15b2f9e3c657ea88f5fefd8de8c7267769ad698bef6b0b92af2ce98e453d2ff120cca8989f485383d31e04fad32bac1144f4a4e96ed01db3ddaf71aaf847c5b74c15fdad6bf13e2bbe125e61c0b3889111bdb3e19d592916f1a755be395304741f47087 public exponent: 10001 ] 2022-03-12 04:23:00.500 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:23:00.502 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:23:00.503 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:23:00.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:23:00.504 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:23:00.505 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:23:00.505 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:23:00.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:23:00.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:23:00.506 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:23:00.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:23:00.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:23:00.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:23:00.512 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:00.654 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:23:00.655 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:23:00.655 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:23:00.656 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:00.657 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:23:00.658 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:23:00.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.660 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.661 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.662 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:23:00.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:37:45:ba:a5:db:91:12:f8:3f:91:c3:a2:02:26:52:a5:b6:e3:12] modulus: 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 public exponent: 10001 ] 2022-03-12 04:23:14.635 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:23:14.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:23:14.637 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:23:14.638 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:23:14.639 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:23:14.640 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:23:14.640 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:23:14.640 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:23:14.640 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:23:14.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:23:14.646 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:23:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:23:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:23:14.648 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:14.776 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:23:14.776 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:23:14.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:23:14.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:14.778 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:23:14.779 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:23:14.779 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.781 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.781 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.782 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.782 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.782 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.783 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:23:14.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:49:f2:c1:d3:34:19:5a:be:56:af:cd:5f:2d:9f:98:53:fb:31:3f] modulus: e6698a6a7f2517a2b58ab994aa96286f70b01d52bec634575759a6bf268c7fefe168141c54370e88b016a8916dbd20a9cd68c47885362227957477daf9cb35779de956669723d4bbc6c3233ae17742371125c93183ef8c79b20111aca6b4796867716583e95ebffdc0c1be16a77fa701337cf740eff02d344932aca4287c8a5b236b805291ce6449db53ca1b9ae4976372f0034502dc0a85f79511946cbef91e9de37dd7058055ba27d01e605a3aec1d704c99faad40bcf3c1cdb66131bc4cfdc35fb97ec53e6e6c925ade08f6e8c23925fdae4555bbeebf83049942e24ac5d8337fc8fd159d6dfb32602c1595b3f75addd19927a170c4adeb56be2d6d9ae375 public exponent: 10001 ] 2022-03-12 04:25:02.433 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:25:02.435 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:25:02.436 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:25:02.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:25:02.437 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:25:02.437 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:25:02.438 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:25:02.438 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:25:02.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:25:02.439 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:25:02.444 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:25:02.444 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:25:02.444 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:25:02.445 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:25:02.568 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:25:02.569 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:25:02.569 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:25:02.570 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:25:02.571 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:25:02.572 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:25:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.572 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.573 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.573 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:25:02.579 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:94:84:c2:39:b8:f8:ec:1a:d2:ce:a8:9e:c0:2a:df:2c:c1:9b:2b] modulus: 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 public exponent: 10001 ] 2022-03-12 04:28:52.659 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-12 04:28:52.661 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-12 04:28:52.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:28:52.664 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:28:52.665 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:28:52.666 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-12 04:28:52.666 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-12 04:28:52.667 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-12 04:28:52.667 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-12 04:28:52.668 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-12 04:28:52.686 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-12 04:28:52.688 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:28:52.688 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-12 04:28:52.689 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:28:52.862 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-12 04:28:52.863 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-12 04:28:52.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-12 04:28:52.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:28:52.866 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-12 04:28:52.866 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-12 04:28:52.867 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.868 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.868 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.869 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.869 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.869 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.870 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.870 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.871 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.871 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:28:52.876 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:79:71:5d:7f:10:44:64:66:f5:97:15:ca:cb:74:c9:79:12:12:a8] modulus: ebf04e619bdfe6504abaa7d70005b53ce93bcd2b4fef885334f384786cb39c22c09cccc8859b390bc823e8286682bea69003c9f6f71ac0576e177f233b18ad4323a779d7c7b03fadcce8a8459ce08b5843cb53539baab228534bf0a5f152e92d05fad924e7c64648495268f2b9eb4d5506fd27b49a6878776678d8ae5f3f93a7c828880f2dc08c0e81f913e6bdf6a8776b9e6cbeaae2a47e0931f7e1ea314c7dae1cef5010741ca9d93b21e26d9330b243551bfb56f369992885e225c24843e78affc88d69c5ee0c8a53b66de4ca844a712841b670439162581c1afdf7105e9d2f166f6f072347dbe702dc5777cbf6ddbeea5cea6ab9594a53925976aed3943f public exponent: 10001 ]