By type
2022-03-20 03:18:56,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-20 03:18:58,704 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-20 03:18:59.710 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 20, 2022 3:19:02 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 20, 2022 3:19:02 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 20, 2022 3:19:02 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 20, 2022 3:19:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-20 03:19:03.234 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-20 03:19:03.600 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-20 03:19:03.855 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-20 03:19:04.987 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-20 03:19:04.992 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-20 03:19:04.997 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-20 03:19:05.002 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-20 03:19:05.075 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-20 03:19:05.082 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-20 03:19:05.299 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-20 03:19:06.145 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 20, 2022 3:19:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-20 03:19:07.369 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 11.547 seconds (JVM running for 14.003) Mar 20, 2022 3:19:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-20 03:19:48.480 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 03:19:48.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 03:19:48.535 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-20 03:19:48.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 03:19:48.574 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-20 03:19:48.582 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 03:19:48.583 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 03:19:48.586 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 03:19:48.586 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 03:19:48.599 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 03:19:48.612 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 03:19:48.618 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 03:19:48.680 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 03:19:48.687 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 03:19:48.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 03:19:48.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 03:19:49.559 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 03:19:49.564 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 03:19:49.564 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 03:19:49.567 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 03:19:49.578 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 03:19:49.579 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 03:19:49.580 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 03:19:49.580 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 03:19:49.581 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 03:19:49.594 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 03:19:49.595 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 03:19:49.596 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 03:19:49.603 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 03:19:49.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 03:19:49.605 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 03:19:49.607 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 03:19:49.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:6d:ae:aa:12:f8:4b:43:ea:c9:af:39:5d:4e:d7:a0:5b:ae:66:7f] modulus: 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 public exponent: 10001 ] 2022-03-20 04:33:27.438 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:33:27.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:33:27.453 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 04:33:27.466 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:33:27.467 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 04:33:27.470 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:33:27.471 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:33:27.473 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:33:27.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:33:27.475 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:33:27.490 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:33:27.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:33:27.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:33:27.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:33:27.818 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:33:27.819 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:33:27.819 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:33:27.820 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:33:27.824 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:33:27.825 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:33:27.825 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:33:27.826 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:33:27.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:33:27.832 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:33:27.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:33:27.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:33:27.835 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:33:27.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:33:27.836 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:33:27.838 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:33:27.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:12:dd:bd:7c:63:d2:b1:e0:74:3a:7b:19:88:79:78:fd:59:4c:96] modulus: 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 public exponent: 10001 ] 2022-03-20 04:34:56.234 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:34:56.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:34:56.238 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 04:34:56.238 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:34:56.239 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 04:34:56.240 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:34:56.240 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:34:56.241 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:34:56.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:34:56.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:34:56.261 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:34:56.262 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:34:56.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:34:56.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:34:56.486 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:34:56.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:34:56.488 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:34:56.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:34:56.493 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:34:56.494 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:34:56.494 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:34:56.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:34:56.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:34:56.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:34:56.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:34:56.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:34:56.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:34:56.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:34:56.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:34:56.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:34:56.505 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:2e:71:af:78:bb:79:80:e3:94:d5:97:8c:d0:29:68:d4:a9:40:e0] modulus: edc7da86a08c20185ba1aed85a4f7cc9d9485cbf458f1c8fdef0ffe8408d48c1454b65c2898e29f81bcfd732051fe79ee2311730a1ebc4ebbf1934f5f587f1923d9e362ff72b40cd8f84a2bcf3741313079239ad5f515ff01afabbb1925144412beeda153165bf2340bf3c0e22334a8a29cd9e8a2ad03e135eaf0d79b9a88bdbc7ec0be3f4b390cd1e800dfd2d6748057e189b99a797010027ccd01327ca40168674f07ceb61b2c935bc36c7afd6ee29f505c92f737aab8db1de59d714c6fe01b1b3ac907907f7b0f17fc2cf0e69fccc817474ba26a6154cc0f46940c8d987c399b6810559426ca680b5cfaaa8ed890397e3f03400762c8350caf8a72b295689 public exponent: 10001 ] 2022-03-20 04:37:06.519 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:37:06.522 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:37:06.524 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 04:37:06.526 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:37:06.526 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 04:37:06.527 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:37:06.528 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:37:06.528 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:37:06.529 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:37:06.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:37:06.537 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:37:06.539 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:37:06.539 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:37:06.539 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:37:06.782 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:37:06.783 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:37:06.784 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:37:06.785 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:37:06.788 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:37:06.789 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:37:06.790 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:37:06.790 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:37:06.791 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:37:06.792 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:37:06.793 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:37:06.794 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:37:06.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:37:06.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:37:06.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:37:06.799 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:37:06.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:b7:7a:39:d4:53:84:6f:d1:22:09:eb:7f:44:e8:4f:a3:ce:f9:6e] modulus: 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 public exponent: 10001 ] 2022-03-20 04:38:18.985 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:38:18.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:38:18.990 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 04:38:18.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:38:18.993 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 04:38:18.994 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:38:18.997 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:38:18.998 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:38:18.998 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:38:18.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:38:19.006 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:38:19.007 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:38:19.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:38:19.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:38:19.202 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:38:19.203 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:38:19.204 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:38:19.204 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:38:19.206 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:38:19.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:38:19.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:19.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:19.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:19.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:19.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:19.211 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:19.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:19.212 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:19.213 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:19.214 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:38:19.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:ff:61:44:ef:d5:d1:44:bd:9d:43:28:c3:0f:15:99:ca:ff:59:83] modulus: de6dcd56dc4c2a92960cb2043c8897040b741e541eb835731e77ee2fec1adc9b887fa0e559bb7249df07c3eb550f29f759eea40f57d753f6c494fcc4f71e8e8acd3b980d867c9c0a2c313ae5782a3d5b7310fa3af4e3108cb1f8161ac2503a154a78f4c151995c43252be5aab6f67c29ad8104b476f36d83f6636d816df8999270f65c7ca3a104365c78fbeb32c94daadba5a965c9ff5cb7d8aad0d424b39e55f1f756a369ff52589e0359e0919063a6ca4653d9fb7f16d7afde8c9c9e3180ea9fca70d68a303ce8668edbca29498e14db99817c974a248f4d443fc74b410b8155a1a07107df5e668ef415b8ec920279f82c6544d62b0d3c26c0a22d04a0230b public exponent: 10001 ] 2022-03-20 04:38:52.040 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:38:52.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:38:52.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-20 04:38:52.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:38:52.050 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-20 04:38:52.051 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:38:52.052 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:38:52.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:38:52.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:38:52.054 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:38:52.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:38:52.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:38:52.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:38:52.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:38:52.252 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:38:52.253 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:38:52.254 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:38:52.254 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:38:52.257 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:38:52.258 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:38:52.259 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:52.259 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:52.259 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:52.260 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:52.261 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:52.261 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:52.262 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:38:52.262 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:38:52.262 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:38:52.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:38:52.270 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:31:98:f3:29:b7:ab:e0:25:6e:4b:10:b4:70:f1:21:71:a7:da:0f] modulus: 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 public exponent: 10001 ] 2022-03-20 04:39:28.763 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:39:28.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:39:28.768 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-20 04:39:28.769 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:39:28.769 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-20 04:39:28.770 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:39:28.771 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:39:28.771 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:39:28.772 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:39:28.772 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:39:28.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:39:28.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:39:28.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:39:28.779 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:39:28.960 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:39:28.961 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:39:28.961 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:39:28.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:39:28.963 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:39:28.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:39:28.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:28.965 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:28.966 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:28.966 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:28.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:28.969 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:28.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:28.971 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:28.971 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:28.973 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:39:28.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:19:dd:76:54:cc:c7:d2:e9:8a:78:fa:e5:3f:5b:da:b8:e5:0f:8d] modulus: a89871ea8ce29085639dcbe6445b7f811cbc98f1292c95d1d0713af364561150573d9e3c468385b3ee3c2ca09ab1ffdf4261fa782d77f17ecc66159b7ff15a6ca42665885566a298d52d50a9ac7018e00a72d193ab3ee2065eefc1452b3ca90ba3e85f78c350e0c24cdcd93f5dbb8b18fe70abe8d6ea26c5f0d6c1cc028f3074eb72c0a358b46af03cc5804c7aed601975f654047b73f99e148e9ee66af2d313583c1b85b66d05ed8abe20d9ca8603550e1d0aa294066eecedd3bb50f41aeaa76312ee8e30d8402ee2eb9ed4c2606c767743f30ad1caef9475a773479f72f7767d4ba0f435ba7c0be5556fcab17f3715de7ea75aa908ea4b23431aba47be3fb3 public exponent: 10001 ] 2022-03-20 04:39:39.675 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:39:39.676 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:39:39.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-20 04:39:39.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:39:39.680 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-20 04:39:39.680 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:39:39.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:39:39.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:39:39.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:39:39.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:39:39.689 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:39:39.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:39:39.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:39:39.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:39:39.862 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:39:39.863 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:39:39.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:39:39.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:39:39.866 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:39:39.866 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:39:39.867 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:39.867 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:39.868 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:39.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:39.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:39.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:39.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:39:39.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:39:39.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:39:39.872 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:39:39.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:e6:05:3a:8c:a6:08:c4:31:a4:be:00:16:36:fa:c5:de:1d:6f:9d] modulus: 9f495d4cc82ddaa2f81a17f44f4c8be5eb78e223218092197da8e73fefb94ab9c1a477b540b2f4b37d1252db914eebe0656b8f0a3e9328acc38ba131127b73e419313861f8e346cd9226addd50af87c7b5c1ba35a053df3c990ee264777fa5cd3b5b7437868b24923986bb93f0825b36c05ccabb78c46d04149f0dcd838dac735fef33361a04e041c7b96697b96d4bc58e83a881340c44f82f3fea62ba9e8821e6c18d2dd39fcd9f0e7f75d240b172062802610cbfb8b91cbb7016e71ff920039e0722a51570f0712a1c5aeff1b17353d16beeb2dc3ba2186b18e00eb8977ae72b647edd1849c866a59f6e87b82bfde48e3f15840f92ce5530d664419e5763c3 public exponent: 10001 ] 2022-03-20 04:41:36.657 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:41:36.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:41:36.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 04:41:36.667 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:41:36.667 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 04:41:36.668 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:41:36.672 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:41:36.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:41:36.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:41:36.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:41:36.686 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:41:36.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:41:36.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:41:36.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:41:36.866 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:41:36.867 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:41:36.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:41:36.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:41:36.870 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:41:36.871 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:41:36.871 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:41:36.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:41:36.872 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:41:36.873 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:41:36.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:41:36.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:41:36.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:41:36.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:41:36.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:41:36.877 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:41:36.883 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:cd:59:4b:b0:e4:aa:d1:a6:55:3f:af:03:a3:c5:b1:2d:db:3e:b0] modulus: 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 public exponent: 10001 ] 2022-03-20 04:56:26.224 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 04:56:26.227 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 04:56:26.229 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 04:56:26.230 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 04:56:26.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 04:56:26.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 04:56:26.232 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 04:56:26.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 04:56:26.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 04:56:26.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 04:56:26.239 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 04:56:26.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:56:26.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 04:56:26.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:56:26.417 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 04:56:26.418 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 04:56:26.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 04:56:26.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 04:56:26.421 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 04:56:26.422 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 04:56:26.422 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:56:26.423 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:56:26.423 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:56:26.424 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:56:26.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:56:26.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:56:26.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 04:56:26.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 04:56:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 04:56:26.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 04:56:26.432 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:ee:2e:02:50:99:a3:f3:df:61:db:81:78:1a:10:c1:d8:31:0d:8f] modulus: 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 public exponent: 10001 ] 2022-03-20 05:00:21.435 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:00:21.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:00:21.442 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 05:00:21.444 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:00:21.444 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 05:00:21.445 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:00:21.446 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:00:21.446 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:00:21.447 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:00:21.447 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:00:21.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:00:21.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:00:21.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:00:21.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:00:21.676 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:00:21.677 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:00:21.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:00:21.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:00:21.680 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:00:21.680 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:00:21.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:21.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:21.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:21.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:21.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:21.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:21.683 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:21.683 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:21.683 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:21.684 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:00:21.689 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:b8:a7:8c:54:c4:b0:49:45:2e:b3:27:00:8d:fe:9e:13:1a:15:9b] modulus: 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 public exponent: 10001 ] 2022-03-20 05:00:36.806 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:00:36.808 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:00:36.811 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 05:00:36.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:00:36.812 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 05:00:36.813 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:00:36.814 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:00:36.814 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:00:36.815 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:00:36.815 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:00:36.821 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:00:36.822 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:00:36.822 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:00:36.822 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:00:37.027 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:00:37.028 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:00:37.028 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:00:37.029 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:00:37.031 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:00:37.031 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:00:37.032 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:37.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:37.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:37.036 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:37.036 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:37.037 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:37.037 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:00:37.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:00:37.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:00:37.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:00:37.045 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:a8:b0:35:4c:4a:11:0a:59:e1:59:12:6d:5c:6d:5d:9d:09:4b:24] modulus: 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 public exponent: 10001 ] 2022-03-20 05:01:14.204 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:01:14.205 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:01:14.207 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-20 05:01:14.207 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:01:14.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-20 05:01:14.208 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:01:14.209 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:01:14.209 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:01:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:01:14.210 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:01:14.215 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:01:14.216 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:01:14.217 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:01:14.217 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:01:14.429 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:01:14.429 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:01:14.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:01:14.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:01:14.432 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:01:14.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:01:14.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:14.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:14.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:14.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:14.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:14.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:14.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:14.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:14.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:14.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:01:14.444 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:83:06:90:5f:8b:93:21:06:76:36:07:0b:aa:70:ad:af:48:38:0c] modulus: c010400ca9116b7c92f6ed66d73eef7a270b933a0074f5bc543e41c2b151dca58a7b2db5d34746715ae80702defc2b45dfa8f8f153a19905788b1f1cf527a85cd57cd35f3bd2d2f2af96b5e122149176763920b18c3f7558ff5dcddec6b862b11091b6fd8af361ecfd818674d6e00ef36603c3024541f3a9e7db734ca5f699a84541999fa46ae6abe35db2a6292aeef30dd5d310922fde4e80bc0aca32bcb90e44cd28b5984cd63ead953408ac10925492af1a6683c2c70877bedcc2d87bb4fafbd0b0dd10439eaa2ba00a85bf4878f8b4bcea3838baaf587eb28d800aee2a74ce8f974ef67389a6e77879155b81f2e780e6a015ef7679b96d591bcebb37a171 public exponent: 10001 ] 2022-03-20 05:01:54.976 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:01:54.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:01:54.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-20 05:01:54.985 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:01:54.986 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-20 05:01:54.987 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:01:54.988 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:01:54.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:01:54.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:01:54.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:01:54.997 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:01:54.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:01:54.998 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:01:54.999 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:01:55.205 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:01:55.207 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:01:55.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:01:55.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:01:55.238 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:01:55.239 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:01:55.240 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:55.241 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:55.241 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:55.242 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:55.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:55.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:55.245 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:01:55.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:01:55.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:01:55.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:01:55.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:ae:7e:45:90:fd:6d:6e:21:8d:81:a0:25:00:f5:ca:15:6e:5b:df] modulus: d4a35752d129cb71f65e2abed0a1786d52741792a2d6cf2fab5f2e71591976bafbf5a6802876447759eb3f09945c4d04d5687f766e3718c8a662ca5baf6b5d9b1aef38e68092550d8b44d3f29298289286007a517a89595c522cfbc30468d1c0b6b46aabfb671ff31b285971f2e3029b4069edec8f032445817f70e2de5be3b3538d7375d7ce252e8169fa3da5d088a831869fd3b962b4a2e9586a44196970359eb70ae690a4116734023502501c99723348e8faf57c9564c0430dafc6d854a90db6b675bf72fbd8ee3ab8e2f962c7b7caab10ad57c4489533c5ed8e01fe66aa7fe15d9525bce1ce129f8ab8d50a4ce829f413be893edcd26eeaf4190f71a367 public exponent: 10001 ] 2022-03-20 05:04:27.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:04:27.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:04:27.066 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 05:04:27.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:04:27.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-20 05:04:27.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:04:27.069 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:04:27.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:04:27.069 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:04:27.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:04:27.075 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:04:27.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:04:27.076 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:04:27.077 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:04:27.295 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:04:27.295 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:04:27.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:04:27.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:04:27.297 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:04:27.298 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:04:27.298 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:04:27.299 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:04:27.299 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:04:27.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:04:27.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:04:27.301 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:04:27.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:04:27.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:04:27.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:04:27.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:04:27.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:fb:24:df:af:ef:9f:6f:8e:1c:f2:2e:23:d9:b9:4c:db:cb:3c:ed] modulus: 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 public exponent: 10001 ] 2022-03-20 05:06:06.322 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:06:06.324 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:06:06.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 05:06:06.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:06:06.328 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-20 05:06:06.329 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:06:06.329 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:06:06.329 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:06:06.330 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:06:06.330 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:06:06.339 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:06:06.340 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:06:06.340 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:06:06.341 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:06:06.594 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:06:06.595 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:06:06.596 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:06:06.596 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:06:06.599 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:06:06.600 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:06:06.601 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:06:06.601 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:06:06.601 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:06:06.602 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:06:06.603 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:06:06.603 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:06:06.604 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:06:06.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:06:06.607 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:06:06.608 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:06:06.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:58:a1:63:e4:3b:a2:8c:44:25:b7:35:bd:66:d6:45:05:b7:ad:47] modulus: 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 public exponent: 10001 ] 2022-03-20 05:10:29.494 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-20 05:10:29.502 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-20 05:10:29.512 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 05:10:29.516 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-20 05:10:29.520 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-20 05:10:29.521 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-20 05:10:29.521 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-20 05:10:29.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-20 05:10:29.522 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-20 05:10:29.522 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-20 05:10:29.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-20 05:10:29.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:10:29.539 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-20 05:10:29.539 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:10:29.722 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-20 05:10:29.724 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-20 05:10:29.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-20 05:10:29.725 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-20 05:10:29.727 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-20 05:10:29.727 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-20 05:10:29.727 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:10:29.728 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:10:29.728 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:10:29.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:10:29.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:10:29.729 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:10:29.733 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-20 05:10:29.733 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-20 05:10:29.733 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-20 05:10:29.734 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-20 05:10:29.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 104335131105005706299521300063180802303600701538 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 20 03:16:04 UTC 2022 Final Date: Fri Mar 19 03:16:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1822be73df792972d8487c1ca7315858d8435fa9 f6d0f5e648f2e2ad23cb2787320193483db9a70d 8864f2b715c6b93ca269639b812419be1245d507 f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5 1cfe3ae411a74bfb4dd0c0d121309ed61102cc98 2ea2ae4506716fc33f1c265151e91791ab8afe73 75838c112c1732975751e04a95a230eb15b3a51d 141911b612c69cc32c2f71b296d73761fe0452c5 5ba8f8451d2d04fb7848f8599d3401c081f5c022 edd474c17d6a9914dfc6a0ffcae33fdc247f2df9 b2924fd9d2798dfa5a6a0e9916b0c95f08adab40 9d3d717c98d7d6b61195f06d9fd8f44f87037f9f f70fbc57ce63d6f373177dfca024adaf5ecc01a4 4fffa314510ccb103943a6cd253d3df8121d1b3f ea5997cd063f86a81731a72b82ec1baa0f5d65f7 bd0e8d4805598b6291688d3129d793ba918cd431 f905b82fe157e039bf65a84403bb5629e0182139 23f6371b3b174883745f9f2e0a3ba9998e03f38a fa7bf6b629cd1fe5f4e8774dda009259827b0587 50a8adc9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:40:6b:a7:92:13:47:2f:23:25:a0:91:ac:22:5b:6c:e5:2e:7f:76] modulus: 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 public exponent: 10001 ]