By type
2022-03-22 10:45:54,087 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-22 10:45:55,245 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-22 10:45:56.078 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 22, 2022 10:45:58 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 22, 2022 10:45:58 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 22, 2022 10:45:58 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 22, 2022 10:45:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-22 10:45:58.985 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-22 10:45:59.296 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-22 10:45:59.510 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-22 10:46:00.332 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-22 10:46:00.338 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-22 10:46:00.340 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-22 10:46:00.344 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-22 10:46:00.388 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-22 10:46:00.392 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-22 10:46:00.517 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-22 10:46:01.115 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 22, 2022 10:46:01 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-22 10:46:02.025 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.843 seconds (JVM running for 10.828) Mar 22, 2022 10:46:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-22 10:47:46.565 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 10:47:46.577 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 10:47:46.643 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-22 10:47:46.650 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 10:47:46.673 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-22 10:47:46.676 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 10:47:46.677 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 10:47:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 10:47:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 10:47:46.685 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 10:47:46.693 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 10:47:46.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 10:47:46.742 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 10:47:46.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 10:47:46.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 10:47:46.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 10:47:47.801 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 10:47:47.804 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 10:47:47.805 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 10:47:47.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 10:47:47.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 10:47:47.820 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 10:47:47.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 10:47:47.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 10:47:47.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 10:47:47.841 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 10:47:47.842 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 10:47:47.843 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 10:47:47.852 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 10:47:47.853 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 10:47:47.854 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 10:47:47.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 10:47:47.900 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:b4:ae:90:a4:8d:c8:d0:3e:de:a2:eb:bb:c1:b2:4c:eb:43:03:0f] modulus: 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 public exponent: 10001 ] 2022-03-22 12:16:13.947 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:16:13.951 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:16:13.955 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:16:13.957 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:16:13.957 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:16:13.958 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:16:13.959 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:16:13.959 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:16:13.960 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:16:13.961 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:16:13.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:16:13.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:16:13.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:16:13.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:16:14.151 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:16:14.152 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:16:14.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:16:14.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:16:14.156 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:16:14.156 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:16:14.157 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:16:14.157 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:16:14.158 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:16:14.159 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:16:14.159 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:16:14.160 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:16:14.161 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:16:14.162 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:16:14.162 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:16:14.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:16:14.170 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:61:bb:7c:02:0d:08:19:0f:e6:aa:ed:9b:bc:18:5b:41:f2:9e:60] modulus: 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 public exponent: 10001 ] 2022-03-22 12:17:07.433 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:17:07.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:17:07.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-22 12:17:07.439 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:17:07.439 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-22 12:17:07.440 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:17:07.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:17:07.441 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:17:07.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:17:07.443 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:17:07.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:17:07.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:17:07.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:17:07.458 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:17:07.676 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:17:07.677 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:17:07.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:17:07.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:17:07.681 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:17:07.682 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:17:07.682 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:17:07.683 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:17:07.683 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:17:07.684 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:17:07.685 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:17:07.686 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:17:07.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:17:07.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:17:07.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:17:07.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:17:07.693 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:82:52:d9:54:3f:ce:2e:91:8b:3b:66:c1:eb:28:80:e1:89:9d:cf] modulus: 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 public exponent: 10001 ] 2022-03-22 12:18:43.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:18:43.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:18:43.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-22 12:18:43.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:18:43.700 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-22 12:18:43.701 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:18:43.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:18:43.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:18:43.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:18:43.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:18:43.709 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:18:43.709 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:18:43.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:18:43.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:18:43.851 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:18:43.852 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:18:43.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:18:43.853 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:18:43.855 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:18:43.856 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:18:43.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:18:43.858 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:18:43.859 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:18:43.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:18:43.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:18:43.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:18:43.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:18:43.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:18:43.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:18:43.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:18:43.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:2c:4f:b5:74:e4:5f:d5:29:57:cf:da:73:75:f7:b8:7f:4c:4b:3d] modulus: b72ac78ab5cff5dee856128e671492a5ff3995ef7d93f465c1db7868371217a1f4a04c9e259b5f2d1f590c08f62f7e543646a407d22ec3e0c1af0afd0cb343a4162b2de02cb6d4f6c4b7e12cbb1e01cf9d3cb2fcc4f29168864e0408f570ba33afe51c129881d268a5673b70818d97ee0bab583ab11fe819c57e65904cc67c4d25903cf37a40b3027969e6d3c735bd5da80b81676b56d98c9f625cc254002f13e89a37b41bc9cf2aa3c1983209a2fa7db7b73f4fed9015b4a7cc09916a16aeee7af4fd817cc71cc7249729e930f3f6508a0d2f766a2ee3412d988a81a3bbb79851bfcb2dd46979fe9d0810adaab89c342c1a1224c04664328602631151b411bb public exponent: 10001 ] 2022-03-22 12:20:57.622 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:20:57.625 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:20:57.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-22 12:20:57.629 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:20:57.630 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-22 12:20:57.631 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:20:57.631 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:20:57.632 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:20:57.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:20:57.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:20:57.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:20:57.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:20:57.645 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:20:57.646 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:20:57.794 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:20:57.795 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:20:57.795 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:20:57.796 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:20:57.798 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:20:57.799 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:20:57.799 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:57.800 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:57.800 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:57.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:57.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:57.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:57.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:57.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:57.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:57.806 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:20:57.812 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:44:c3:58:64:20:c7:cd:87:c7:f9:bd:77:ac:4c:e3:0f:8f:9a:92] modulus: cdade23ccf868bd6582fcf71a00441bdf4f6e4d2028e08e9567fb74a343a7a40a9ffaf2c296b0afd70986a2f1bbcf5915bd6b397c048a8c6216b73edc3daf83a4d3371694b1a135ddd7d8617e1aa0ad090f2a53e00783def6c06a5626f0eee04dba1d8f90fff14a21e312c8c3d450331ecfca2b4e53735a5abec8ac0e006c155ad72d1a1d95efb7bb469ec3809fbed2814259d82702d25385ea0d42fee85b9032c004cfa1d134ff2649e95b40e8e62f75c6be7808673a94884d1bcdd402f1822e972ae68b95be23036b078a9c1c3011bf56417b97ffc71cd78259192b4c95f1ced880a0ab72c5e549013d3b4b09b311f2f1f7d69c693a28d9897259200558c41 public exponent: 10001 ] 2022-03-22 12:20:59.542 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:20:59.544 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:20:59.546 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-22 12:20:59.547 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:20:59.548 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-22 12:20:59.549 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:20:59.549 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:20:59.550 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:20:59.550 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:20:59.551 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:20:59.560 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:20:59.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:20:59.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:20:59.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:20:59.667 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:20:59.668 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:20:59.669 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:20:59.669 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:20:59.671 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:20:59.671 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:20:59.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:59.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:59.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:59.673 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:59.673 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:59.674 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:59.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:20:59.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:20:59.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:20:59.676 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:20:59.680 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:6b:3b:d5:da:ba:a8:ee:eb:a9:47:2a:ac:67:79:cb:06:97:98:0d] modulus: bb0431c293c7ae55614afef52ffe699f769d5059e1ec5276d0c76ba40e74fda821aeebccdf07292c69d900a7adbecb5458012c05b131b02c03be0fa4d01911b70fd28d07ee644e6ea9900aed688235bfbe55aff8ba58a5d4c2861ba2be8966414453be71d25483496a6b007711c36eeb813ce5838514a9a65095fcbb5719ea1b8f11e0c702223e6d6d5e94d74a0cdff9765c569fa280bf3c649bcb66f6ce6399f69ba97219201b01909df9e9f2af6bd43b1b19d750e4830f9955ea92f714b0e2c67fadb738ed53b91c989cdba9de120d7727d438f27d8e998d456b02a39485858fe37f547adfd2145931c94d818ed801a6cf68a8dfc5dfa14fee8c06cdbd52f3 public exponent: 10001 ] 2022-03-22 12:21:36.951 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:21:36.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:21:36.953 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-22 12:21:36.954 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:21:36.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-22 12:21:36.955 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:21:36.955 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:21:36.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:21:36.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:21:36.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:21:36.961 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:21:36.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:21:36.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:21:36.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:21:37.089 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:21:37.090 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:21:37.091 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:21:37.091 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:21:37.093 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:21:37.093 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:21:37.094 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:21:37.094 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:21:37.094 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:21:37.095 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:21:37.096 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:21:37.096 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:21:37.097 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:21:37.097 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:21:37.098 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:21:37.098 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:21:37.102 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:e7:66:80:88:07:73:76:8f:d7:48:d5:b3:ff:67:e8:fa:e8:3f:44] modulus: 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 public exponent: 10001 ] 2022-03-22 12:22:16.507 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:22:16.509 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:22:16.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-22 12:22:16.511 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:22:16.511 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-22 12:22:16.512 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:22:16.513 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:22:16.513 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:22:16.514 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:22:16.514 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:22:16.519 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:22:16.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:22:16.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:22:16.520 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:22:16.645 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:22:16.646 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:22:16.647 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:22:16.647 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:22:16.649 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:22:16.649 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:22:16.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:22:16.650 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:22:16.650 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:22:16.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:22:16.651 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:22:16.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:22:16.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:22:16.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:22:16.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:22:16.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:22:16.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 9b21346d14d5a197c00a811aae3fb6433157be51474b11cea20d092c1f6923a2ecb971d4312e57ccd6cacdf647bd6e21e8a757a1fed1d9a98b24b4644a1ad6d059ffb33e3ab7090baa6a26049679825ff30922e2756289d2a3579fe80983099a4dcbc54c82f35387c0b4918873b2f5ae794eb43f8532187ddc69a144197ce48128e83d7bbfef860b7a6ea4e22433011582c082e80d15df22b25bb1294853b8a65e9b1beff0e472f1eced8d0f27a27e79eda9a3fa172868af41e6e597482b212636bc59929113ea940a6c73952c8102f209b71af5d504e4d6e50d463d00754578b41da5a800583306848c791275840a92b1dab3ce7eb61c2b4466929f4c26a90bc9274f1433f869f143ec572c61346c08c09b88d7c04f76b3d9d676e9cb1cd792d4cc11df7525533164dd10162455605bf1be5f7b0a82bc28c1ebcda7504e064cd68e15ada805179dd564b5ecc10abe36b85e6afea6ed855d30f703a8c15bf75dea9991fe060c7e2b150e18be5728b774d25902658d4e0079a838851424939d9f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:13:95:b2:91:12:74:b9:25:dc:96:55:0f:ba:a7:20:2c:43:e7:67] modulus: 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 public exponent: 10001 ] 2022-03-22 12:24:19.269 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:24:19.270 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:24:19.272 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-22 12:24:19.273 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:24:19.273 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-22 12:24:19.274 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:24:19.275 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:24:19.275 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:24:19.275 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:24:19.276 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:24:19.283 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:24:19.284 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:24:19.284 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:24:19.285 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:24:19.458 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:24:19.459 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:24:19.459 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:24:19.460 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:24:19.461 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:24:19.462 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:24:19.462 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:24:19.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:24:19.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:24:19.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:24:19.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:24:19.465 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:24:19.466 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:24:19.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:24:19.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:24:19.468 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:24:19.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 9b21346d14d5a197c00a811aae3fb6433157be51474b11cea20d092c1f6923a2ecb971d4312e57ccd6cacdf647bd6e21e8a757a1fed1d9a98b24b4644a1ad6d059ffb33e3ab7090baa6a26049679825ff30922e2756289d2a3579fe80983099a4dcbc54c82f35387c0b4918873b2f5ae794eb43f8532187ddc69a144197ce48128e83d7bbfef860b7a6ea4e22433011582c082e80d15df22b25bb1294853b8a65e9b1beff0e472f1eced8d0f27a27e79eda9a3fa172868af41e6e597482b212636bc59929113ea940a6c73952c8102f209b71af5d504e4d6e50d463d00754578b41da5a800583306848c791275840a92b1dab3ce7eb61c2b4466929f4c26a90bc9274f1433f869f143ec572c61346c08c09b88d7c04f76b3d9d676e9cb1cd792d4cc11df7525533164dd10162455605bf1be5f7b0a82bc28c1ebcda7504e064cd68e15ada805179dd564b5ecc10abe36b85e6afea6ed855d30f703a8c15bf75dea9991fe060c7e2b150e18be5728b774d25902658d4e0079a838851424939d9f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:92:40:8b:b9:a0:a4:42:3a:0f:c9:20:41:39:85:59:94:76:53:35] modulus: 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 public exponent: 10001 ] 2022-03-22 12:37:30.813 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:37:30.817 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:37:30.820 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:37:30.822 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:37:30.823 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:37:30.824 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:37:30.826 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:37:30.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:37:30.828 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:37:30.829 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:37:30.841 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:37:30.844 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:37:30.844 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:37:30.845 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:37:31.046 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:37:31.047 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:37:31.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:37:31.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:37:31.052 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:37:31.052 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:37:31.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:37:31.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:37:31.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:37:31.055 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:37:31.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:37:31.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:37:31.057 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:37:31.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:37:31.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:37:31.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:37:31.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:28:bf:41:82:71:cd:39:1d:eb:34:a5:5e:7f:92:55:a1:7d:dd:2b] modulus: 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 public exponent: 10001 ] 2022-03-22 12:47:35.933 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-22 12:47:35.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-22 12:47:35.937 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:47:35.938 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-22 12:47:35.939 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-22 12:47:35.939 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-22 12:47:35.940 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-22 12:47:35.940 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-22 12:47:35.941 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-22 12:47:35.941 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-22 12:47:35.947 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-22 12:47:35.948 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:47:35.948 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-22 12:47:35.948 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:47:36.103 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-22 12:47:36.104 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-22 12:47:36.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-22 12:47:36.104 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-22 12:47:36.106 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-22 12:47:36.106 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-22 12:47:36.106 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:47:36.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:47:36.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:47:36.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:47:36.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:47:36.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:47:36.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-22 12:47:36.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-22 12:47:36.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-22 12:47:36.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-22 12:47:36.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 186744764572681513527772251597524814506431768704 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 22 10:43:28 UTC 2022 Final Date: Sun Mar 21 10:43:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:1f:74:9a:f7:a2:be:26:10:c8:22:89:c8:9d:95:85:4e:20:f4:e8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14ef43d7700e1f9da361f5c28aadaa3851e0729c d41c6892ce1476f3f32953aaa9fcd9f15c3bcd5e 3955d2ffb13210ac6fe97c52e9b434323a606af3 aa0e31e55fdbd899c028f63f25e6914d5fd539c6 55bb6dd89c11aaa32965012beb41fb2ab980c184 e5ae0c6116cb201930de3df54f77adc1eb755757 5bc58149eb29a64ab9ac8f7fad791bc40bd0b0d1 1832da7c69adcf376705d022cdd43993530a8e4d ff430fe5836faaf5769a9a4943706c4d3a022b2f 46ca1e2599655f75ca8ff2777e108cef8754421a f2c61c2557e359383985f6e389a34761f018c61e 0d6123bed854929d967db540011f770482b69a1e 946d0e96970ff6875b6ff77784a99332b3972a50 e3dd01fae68747faaacfc32e6c98c2789837035e a0bef3de9f71fc68efda8187ab0e31471c8ef14a 9ee0e45ed280ae6849afce26b911a40bbf8f6c92 8d284e80ca1b564f3d12f543c5bf940a2897334b 71dda57a41744da0f7b700ee9b5cc9baf7e1ff8d 066c2e80b164e412c359aa7e90e9b4c7a9320cdd 46c8ca0c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:8c:a6:5f:84:5b:f4:4f:81:6b:27:81:7f:0f:59:fe:db:68:c1:08] modulus: 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 public exponent: 10001 ]