By type
2022-03-15 10:17:29,959 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-15 10:17:31,744 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-15 10:17:32.978 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 15, 2022 10:17:36 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 15, 2022 10:17:36 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 15, 2022 10:17:36 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 15, 2022 10:17:36 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-15 10:17:37.209 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-15 10:17:37.716 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-15 10:17:37.998 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-15 10:17:39.246 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-15 10:17:39.251 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-15 10:17:39.254 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-15 10:17:39.261 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-15 10:17:39.313 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-15 10:17:39.322 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-15 10:17:39.522 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-15 10:17:40.418 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 15, 2022 10:17:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-15 10:17:41.878 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 13.327 seconds (JVM running for 16.448) Mar 15, 2022 10:18:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-15 10:18:28.559 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 10:18:28.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 10:18:28.647 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-15 10:18:28.654 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 10:18:28.675 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-15 10:18:28.680 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 10:18:28.682 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 10:18:28.685 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 10:18:28.686 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 10:18:28.693 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 10:18:28.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 10:18:28.705 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 10:18:28.803 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 10:18:28.817 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 10:18:28.818 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 10:18:28.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 10:18:29.755 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 10:18:29.758 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 10:18:29.759 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 10:18:29.761 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 10:18:29.779 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 10:18:29.782 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 10:18:29.784 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 10:18:29.785 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 10:18:29.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 10:18:29.813 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 10:18:29.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 10:18:29.815 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 10:18:29.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 10:18:29.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 10:18:29.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 10:18:29.827 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 10:18:29.889 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:e4:da:03:98:77:c4:dd:55:a0:80:f0:d2:08:7f:d5:53:b1:7a:4e] modulus: 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 public exponent: 10001 ] 2022-03-15 11:22:12.216 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:22:12.221 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:22:12.227 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:22:12.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:22:12.230 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:22:12.231 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:22:12.232 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:22:12.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:22:12.233 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:22:12.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:22:12.248 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:22:12.250 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:22:12.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:22:12.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:22:12.482 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:22:12.483 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:22:12.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:22:12.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:22:12.489 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:22:12.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:22:12.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:22:12.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:22:12.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:22:12.494 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:22:12.495 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:22:12.495 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:22:12.498 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:22:12.499 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:22:12.499 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:22:12.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:22:12.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:07:43:d2:6d:9f:3e:98:48:fc:c7:72:70:76:27:ce:ae:c4:48:fe] modulus: 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 public exponent: 10001 ] 2022-03-15 11:23:40.813 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:23:40.817 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:23:40.821 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-15 11:23:40.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:23:40.824 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-15 11:23:40.825 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:23:40.826 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:23:40.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:23:40.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:23:40.839 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:23:40.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:23:40.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:23:40.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:23:40.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:23:41.148 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:23:41.150 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:23:41.152 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:23:41.153 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:23:41.159 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:23:41.160 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:23:41.160 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:23:41.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:23:41.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:23:41.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:23:41.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:23:41.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:23:41.165 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:23:41.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:23:41.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:23:41.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:23:41.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:0b:f2:ab:a6:8a:12:6e:d3:1c:dc:b9:99:7b:3f:2c:7b:12:e7:99] modulus: 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 public exponent: 10001 ] 2022-03-15 11:25:13.877 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:25:13.880 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:25:13.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-15 11:25:13.883 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:25:13.884 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-15 11:25:13.885 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:25:13.886 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:25:13.886 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:25:13.887 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:25:13.888 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:25:13.895 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:25:13.897 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:25:13.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:25:13.898 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:25:14.100 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:25:14.101 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:25:14.101 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:25:14.102 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:25:14.106 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:25:14.107 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:25:14.107 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:25:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:25:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:25:14.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:25:14.109 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:25:14.110 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:25:14.111 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:25:14.112 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:25:14.112 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:25:14.114 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:25:14.120 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:12:14:c3:35:b1:c6:fd:37:cc:44:8f:9a:4a:24:1a:1c:45:53:10] modulus: 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 public exponent: 10001 ] 2022-03-15 11:26:19.563 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:26:19.564 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:26:19.566 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-15 11:26:19.567 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:26:19.568 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-15 11:26:19.569 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:26:19.569 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:26:19.570 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:26:19.570 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:26:19.571 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:26:19.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:26:19.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:26:19.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:26:19.580 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:26:19.748 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:26:19.749 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:26:19.749 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:26:19.750 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:26:19.752 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:26:19.753 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:26:19.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:19.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:19.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:19.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:19.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:19.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:19.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:19.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:19.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:19.763 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:26:19.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:a1:cf:6a:b8:88:45:d2:bd:e6:e3:bc:1b:71:10:d6:5d:ab:52:30] modulus: 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 public exponent: 10001 ] 2022-03-15 11:26:51.627 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:26:51.629 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:26:51.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-15 11:26:51.641 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:26:51.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-15 11:26:51.643 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:26:51.643 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:26:51.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:26:51.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:26:51.645 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:26:51.659 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:26:51.660 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:26:51.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:26:51.663 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:26:51.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:26:51.911 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:26:51.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:26:51.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:26:51.913 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:26:51.914 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:26:51.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:51.915 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:51.915 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:51.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:51.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:51.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:51.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:26:51.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:26:51.919 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:26:51.921 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:26:51.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:7b:ab:fe:e2:d4:f7:80:8f:4e:47:24:c8:0c:3f:64:7a:f5:ee:38] modulus: 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 public exponent: 10001 ] 2022-03-15 11:27:27.221 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:27:27.223 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:27:27.224 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-15 11:27:27.225 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:27:27.226 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-15 11:27:27.227 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:27:27.227 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:27:27.228 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:27:27.228 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:27:27.228 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:27:27.239 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:27:27.240 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:27:27.240 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:27:27.241 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:27:27.475 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:27:27.476 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:27:27.476 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:27:27.476 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:27:27.478 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:27:27.479 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:27:27.479 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.479 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.480 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.482 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.482 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.483 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.483 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.485 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:27:27.490 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:26:d1:02:8a:12:c7:a0:4c:21:fc:98:a5:94:0f:13:4f:4d:77:f5] modulus: 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 public exponent: 10001 ] 2022-03-15 11:27:27.574 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:27:27.575 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:27:27.577 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-15 11:27:27.580 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:27:27.580 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-15 11:27:27.581 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:27:27.581 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:27:27.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:27:27.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:27:27.583 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:27:27.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:27:27.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:27:27.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:27:27.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:27:27.707 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:27:27.707 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:27:27.708 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:27:27.708 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:27:27.709 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:27:27.710 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:27:27.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.711 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.711 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.712 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.712 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:27:27.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:27:27.713 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:27:27.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:27:27.718 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:c0:4f:23:8d:53:87:ab:9a:a9:13:ef:85:56:b2:28:6b:9b:fe:f1] modulus: 97f618ef2507c65688ba0e41598ab7a329a5886da632d053b8592780ee538d95fd4c945303abb38188d226d8dd425bba1a217b0816bef947126a1ef22ab6206eebbc524d50106167a9af1030fc5eb3e5c56627644cda1b25a021da34a3543a4ff2ef3cc7e09ad49a3326f2cd26f06db306d7718822eae6f7894152cf1994d85ff62d3eb3de0f78abf70836a96c2b2e2236bf9e4c2fad107989fcde17bd6f60121cccc7d2fa0c497f910d417b225abcfba04ea812d66022f6327fafd8cef229af5a9348c6d59e5ba3f1c5764d28669917abbd8b0f3266a58827ab3533bab0bce2eed727ed98f33203c7a4ef628379cd6e483fd1ebf70e10833aec1c2411201121 public exponent: 10001 ] 2022-03-15 11:29:11.546 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:29:11.549 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:29:11.551 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-15 11:29:11.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:29:11.553 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-15 11:29:11.553 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:29:11.554 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:29:11.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:29:11.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:29:11.555 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:29:11.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:29:11.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:29:11.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:29:11.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:29:11.715 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:29:11.715 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:29:11.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:29:11.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:29:11.717 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:29:11.718 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:29:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:29:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:29:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:29:11.720 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:29:11.720 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:29:11.721 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:29:11.722 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:29:11.722 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:29:11.722 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:29:11.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:29:11.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:8d:73:ce:de:93:6c:66:78:b1:f7:dc:eb:33:94:02:3a:81:5d:c6] modulus: d63b3e67efb877d9351c13000c78d4fcca33bea0df642790ad352f2dfe26086e6b7672bcc1eec2654ec228412d91663177580806e73be8db1a20b50385f6ee21be3bcd1cf7e49591a0fd0786482bba0d9d9c34b4849636b141b59d8905c191357591260796b7c58831a49efb5f36c096619cca4aaf21cab349fbbf3824932204327326f2eecc154c9024dcd34aa51641129d368a9328ae0e3e4c83b472a50b4f22c12eccc9b78f448861546583793e2092b20c4f04a123acb4cdceb3da03382065187bceac54163075b3b8d78a57458fb165dd312e4be67c0bf621c0d589e08f1aeb116b5c6fe37e2adf8dd8fac9baee349600f146ddc818a11ea425cf28fe5d public exponent: 10001 ] 2022-03-15 11:41:54.791 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:41:54.794 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:41:54.797 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:41:54.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:41:54.799 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:41:54.800 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:41:54.800 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:41:54.801 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:41:54.802 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:41:54.802 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:41:54.808 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:41:54.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:41:54.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:41:54.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:41:54.982 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:41:54.983 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:41:54.983 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:41:54.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:41:54.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:41:54.986 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:41:54.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:41:54.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:41:54.987 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:41:54.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:41:54.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:41:54.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:41:54.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:41:54.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:41:54.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:41:54.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:41:54.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: dfa9936f74f704e0d84bf5e5a37284f1b2e6fa43f5a5342a06d7caee1df07ebb109e93a32708821c7e450c541f0619766e3b08b60b2f6c3bf3d7e1764a55e6901749993a4d323c751217a2f14e3624d5a9bd06834a69bbb073fb278c20b459ba872e6ec08e788cc9849adbba4c8717d3f970bf0a73b4ccaa94552b3367c0da1dec984883246b28becfa70759b0d187fdd8c626d7a26c55d9945f63bff5c94a381085b3a125b2fbe7bee09b1f1e0f0382c8e95a36adee356f25285f20ea3a8803500b958f18b63f840a2e926ee6cc4b5f76c1fdd3c29783ffdbcbb94b67ef7c8264ab6fb35171cc15d48ce0c9e1a17baef9bcf5a1dca86edb1f03b12070eb559fb3911141c57a9f7c62a1795d3a2fc2902e807ff402861b80bc7cb6d94d6b3d0dc18e8f8008ab952c42963025ef482a71c0023c5113217c3561245b6259b6ddd8065549170907849a25f6cdbb89d9f0d7c816a3cf4f1c251d4290e82b498f816eacc3b54402b99ce50b6c8a27d5b17eba5d2e0866da9a286913c28111001395a5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:aa:59:fc:b5:94:6e:f5:7d:68:ce:eb:d4:a3:9a:33:ba:9b:73:4b] modulus: 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 public exponent: 10001 ] 2022-03-15 11:51:59.918 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-15 11:51:59.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-15 11:51:59.924 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:51:59.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-15 11:51:59.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-15 11:51:59.926 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-15 11:51:59.927 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-15 11:51:59.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-15 11:51:59.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-15 11:51:59.929 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-15 11:51:59.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-15 11:51:59.936 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:51:59.936 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-15 11:51:59.937 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:52:00.125 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-15 11:52:00.126 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-15 11:52:00.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-15 11:52:00.126 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-15 11:52:00.128 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-15 11:52:00.128 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-15 11:52:00.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:52:00.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:52:00.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:52:00.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:52:00.130 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:52:00.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:52:00.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-15 11:52:00.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-15 11:52:00.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-15 11:52:00.133 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-15 11:52:00.138 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 353644600663169900784268165406587956692090962733 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 15 10:15:16 UTC 2022 Final Date: Sun Mar 14 10:15:15 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:78:f8:a7:c3:9a:82:02:be:84:89:6c:ec:d9:5d:0d:99:46:6f:47] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bbdeba9443ed904285466aa8e6edf4f7221dfc1b 17ed7c78ea5e0af98f8c4ae6fbbf010d376d30e2 6dde5a4c22452faa5e10b78406c8d535eaed4f97 786f7e5879fe99f851f688f6cef155886cb6b459 8c8684c2f8b2976fbf63378aef7e4cdff4d3b3fd 505fea9a76c3c5e689362f806b8d611e65b87061 e3dd4230bf00b491066bac32cdf88b98db6d1be1 e8631471a9b6bed9bfb6849f093f2d5f3afecf6a 2c218d9536561af132faead22fb330b4f0e2a833 e8c48d7f831bab05d6e45d39842841acb694fc9a c6c170fbfb740d4a189727f995eabdda2ff19f21 be2ed1ecee8f12a95ea25720b213e120c41c10eb b53b7be830606d16ceab2e7c96027a5fcd0f6fc3 9b350e3bb866ce7c48afcc896ac3ca3f92cb629e 1c4756fba58f63ae6b4a2f6223a6fe312d2039f3 706627702d02aa35648ae9bd4f44b52a09dd3d3a 1c7537edbe30b8284be3849c9b65033cdbb81864 5c048a843267723e655d263e5561a26cc02ed77d 49e79d5380a4aaf9b4bb70f6b2ad13d1aae897ec c64a4b4e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:13:07:13:4e:ff:49:b8:ff:cd:90:f4:f0:47:53:57:f5:51:96:68] modulus: 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 public exponent: 10001 ]