By type
2022-04-18 03:18:58,740 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-18 03:18:59,914 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-18 03:19:00.822 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 18, 2022 3:19:03 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 18, 2022 3:19:03 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 18, 2022 3:19:03 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 18, 2022 3:19:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-18 03:19:03.960 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-18 03:19:04.364 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-18 03:19:04.548 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-18 03:19:05.408 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-18 03:19:05.411 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-18 03:19:05.412 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-18 03:19:05.418 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-18 03:19:05.460 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-18 03:19:05.465 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-18 03:19:05.619 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-18 03:19:06.663 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 18, 2022 3:19:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-18 03:19:07.722 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.868 seconds (JVM running for 11.633) Apr 18, 2022 3:19:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-18 04:29:56.188 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:29:56.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:29:56.280 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:29:56.288 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:29:56.314 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:29:56.317 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:29:56.318 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:29:56.320 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:29:56.320 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:29:56.326 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:29:56.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:29:56.411 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:29:56.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:29:56.467 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:29:56.468 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:29:56.471 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:29:57.349 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:29:57.353 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:29:57.354 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:29:57.356 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:29:57.375 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:29:57.377 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:29:57.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:29:57.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:29:57.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:29:57.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:29:57.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:29:57.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:29:57.405 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:29:57.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:29:57.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:29:57.408 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:29:57.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:5d:ae:f7:97:2b:a5:f2:96:37:63:2b:16:5b:ae:84:8f:c4:bd:f0] modulus: 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 public exponent: 10001 ] 2022-04-18 04:31:09.688 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:31:09.690 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:31:09.692 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:31:09.693 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:31:09.694 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:31:09.696 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:31:09.699 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:31:09.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:31:09.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:31:09.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:31:09.710 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:31:09.712 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:31:09.713 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:31:09.713 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:31:09.885 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:31:09.886 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:31:09.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:31:09.887 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:31:09.892 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:31:09.893 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:31:09.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:31:09.894 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:31:09.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:31:09.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:31:09.896 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:31:09.897 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:31:09.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:31:09.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:31:09.899 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:31:09.904 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:31:09.909 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:f7:c9:7d:98:b8:ae:b1:69:8c:3a:bf:e8:52:19:97:b2:ba:33:45] modulus: b74ff5aa20b39fc6c7c384cc863d8573a37682a4eb0a35ba8ceea2bebea0c3f597d5c07cbf938d3c59f733c7987234e759c3ad7e075655531a21197adef7758eb932d0165670cd1c9445334c46a8728309a5243e0a7f14ce8c1cfa9392be532566ff27a5c2db0261f2be9c5448f21648c377f7101a140fb69675d5b5c73cfcec2b3eca4cc83c67d181441e19195684c48ee77952ecbe9c8e3e3732083a3887ac6b05c071193c158adc09e7dba97be76c62a2b90b6f1a44125e230eda78f04ebecfc2cfaa5ca9c9ab929a6f76638395a3e3a817acdbe1e809f09400f33880f30d50145127d8184d4d92bea5edd11c2d2c4c057f4c41c84766b3018fca77a6b5d1 public exponent: 10001 ] 2022-04-18 04:32:26.910 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:32:26.912 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:32:26.914 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:32:26.915 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:32:26.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:32:26.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:32:26.917 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:32:26.917 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:32:26.918 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:32:26.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:32:26.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:32:26.928 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:32:26.928 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:32:26.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:32:27.102 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:32:27.103 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:32:27.103 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:32:27.104 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:32:27.106 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:32:27.106 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:32:27.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:32:27.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:32:27.107 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:32:27.108 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:32:27.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:32:27.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:32:27.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:32:27.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:32:27.111 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:32:27.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:32:27.117 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:3b:1d:fe:de:f3:31:93:cd:0d:9b:b7:86:50:8b:5b:04:87:d9:25] modulus: ba6bbb327f3b6b779506ebe81cb453b84c3795aa4c98a747a78ecd2e564ad45a2b0327f8122f102b836f7216fbd9440cef54aaa9dc6a8a93268902c87dfa5b1c3d62536fe65a37b3b9493b9b2de4ea1e3b84801cdba5facbe877ae621594a6eea8dafc59419aa50d207b512b619465f2920d9aa43b7857a46ff76ff22bffbcae6a4d7f638a4b98e2c9bb2d777d881310d9569ef894a72fa36d6de3f8d1fe37077e24aa60fd5ad6450c8d0a1307bc31756869826d766341e8ebb397047f2383c2a3fc1da001d88433a5c20c3321ee9f8f2cba8ef6d1fc72d291b1e8aa6084dd081cbf4532befea392f714f63cd3753613ce7833bb4494aeef2229af7dc93221e9 public exponent: 10001 ] 2022-04-18 04:34:16.996 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:34:17.000 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:34:17.004 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:34:17.005 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:34:17.006 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:34:17.008 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:34:17.009 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:34:17.010 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:34:17.010 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:34:17.011 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:34:17.017 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:34:17.018 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:17.019 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:17.020 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:17.182 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:34:17.183 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:34:17.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:34:17.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:17.186 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:34:17.187 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:34:17.187 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.189 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.190 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.190 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.191 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:34:17.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:71:b5:18:55:da:65:b9:12:99:19:bc:4f:56:7c:1b:e8:f7:31:50] modulus: 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 public exponent: 10001 ] 2022-04-18 04:34:17.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:34:17.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:34:17.285 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-18 04:34:17.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:34:17.286 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-18 04:34:17.287 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:34:17.288 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:34:17.288 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:34:17.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:34:17.289 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:34:17.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:34:17.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:17.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:17.296 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:17.402 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:34:17.403 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:34:17.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:34:17.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:17.405 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:34:17.406 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:34:17.406 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.407 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.407 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:17.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:17.410 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:17.411 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:34:17.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:99:b6:99:34:a6:dd:e7:8f:80:c9:59:26:c1:27:fd:e7:86:8e:77] modulus: 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 public exponent: 10001 ] 2022-04-18 04:34:49.240 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:34:49.242 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:34:49.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 04:34:49.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:34:49.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 04:34:49.245 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:34:49.245 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:34:49.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:34:49.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:34:49.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:34:49.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:34:49.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:49.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:34:49.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:49.391 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:34:49.392 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:34:49.392 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:34:49.392 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:34:49.394 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:34:49.395 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:34:49.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:49.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:49.396 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:49.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:34:49.398 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:34:49.399 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:34:49.400 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:34:49.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: a27657732b96d728dd6d0bd6fe88ab5da27b0361aa9bb00cf0afbb02d759bb76dca59966985f91a51cdb9054dd868649bb76fc98419a86bf84ee84113eddb512e7b4cfd131b18059dcc6585d666e01c8ff9b3cf956ef917b59440ac8339920c88c973072fb689aaef3f7651814b1ee5df3ba1d52c631509febd92937984b32bead369abd250cc88d1631f9d860cdbd1d6780aedb0ff6c489d88684e5c6a375e14ad493082dceb6c64d609cfe6d6627d7741ff6088cd8f82a396627431dede6ed8e4680850cb477d65b0562e6d7de6eb6e5c8537b2dd6fb64be535655fbc0eda9f46ab3ca52d84ae586092b7d366d1764fee749d24ecf5d533983faa9af8322839551503531b41182f7ca29739f8e5a2f3c53c64142a0e912e071cae63eb83609ae9e3c3d457236f94df44a7e7587b1d02d3dbe1fa372cf9bcacfd06543b7adaf22a09bf4c9b8390e2d848369106b38632ebfb0b6bbd9026ea525c7cd3723a527a86325b63841fe2479e65e2cb7b5b2304618e88ef32feb904765ba53d6f5ffad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:ec:1f:42:cf:60:54:dc:83:58:14:9b:67:e2:46:f1:50:8b:b8:ad] modulus: cc410f864c7e20295e88b617128649a2edbf448b65f78ee7f612823d0e236755245f5193e11427b1dbd8cc92fdf2ac23b4a0b23fb436de3a51740400863a459f6d5b121339ff90886e000357437c00dd9cfb32d523054d57e41c6bb7f1301c8dd0d27c93f3629ecbbfb5feaf1e24c24cd0e824924dae61db1b8a9c915dd7fb9497d9e5e442c0229d9d1ee8c2d1186b9758f62e0a65bb4c4699266cc34559e1d82e7bebb3927fbdaef08736d784607e9ede1d1e14426b425a146be4b05bee7ca63ae0999e49ee6829b65ebef4555e9f09b92e11d62509c2ab72d3fd3279bf54a0a5cab41978fde4dad54457ac235b14d6060cbee4aad0a3bca25b37198645b7bf public exponent: 10001 ] 2022-04-18 04:35:26.947 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:35:26.949 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:35:26.952 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-18 04:35:26.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:35:26.953 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-18 04:35:26.954 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:35:26.954 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:35:26.955 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:35:26.955 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:35:26.956 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:35:26.961 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:35:26.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:35:26.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:35:26.963 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:35:27.146 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:35:27.146 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:35:27.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:35:27.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:35:27.149 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:35:27.149 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:35:27.150 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:35:27.150 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:35:27.151 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:35:27.151 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:35:27.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:35:27.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:35:27.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:35:27.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:35:27.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:35:27.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:35:27.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:33:90:6a:39:81:c3:81:27:04:7c:4e:90:ca:c5:d0:e7:f4:97:88] modulus: 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 public exponent: 10001 ] 2022-04-18 04:37:13.546 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:37:13.552 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:37:13.559 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:37:13.561 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:37:13.562 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:37:13.564 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:37:13.564 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:37:13.565 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:37:13.565 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:37:13.566 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:37:13.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:37:13.575 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:37:13.575 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:37:13.577 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:37:13.785 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:37:13.786 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:37:13.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:37:13.787 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:37:13.789 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:37:13.790 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:37:13.790 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:37:13.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:37:13.791 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:37:13.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:37:13.793 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:37:13.794 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:37:13.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:37:13.795 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:37:13.796 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:37:13.798 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:37:13.804 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:43:f0:88:74:82:bf:09:23:8c:4c:f9:25:20:b7:57:9f:a3:e7:e7] modulus: 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 public exponent: 10001 ] 2022-04-18 04:49:44.075 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:49:44.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:49:44.081 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:49:44.082 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:49:44.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:49:44.083 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:49:44.083 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:49:44.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:49:44.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:49:44.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:49:44.090 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:49:44.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:49:44.091 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:49:44.092 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:49:44.295 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:49:44.296 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:49:44.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:49:44.297 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:49:44.299 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:49:44.299 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:49:44.300 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:49:44.300 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:49:44.301 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:49:44.301 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:49:44.302 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:49:44.302 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:49:44.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:49:44.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:49:44.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:49:44.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:49:44.309 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:54:d2:f5:2f:e2:06:ef:72:5d:0f:dd:41:f3:19:4a:38:38:58:29] modulus: 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 public exponent: 10001 ] 2022-04-18 04:53:36.318 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:53:36.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:53:36.324 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:53:36.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:53:36.326 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 04:53:36.326 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:53:36.327 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:53:36.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:53:36.328 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:53:36.328 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:53:36.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:53:36.339 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:53:36.340 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:53:36.341 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:53:36.545 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:53:36.546 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:53:36.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:53:36.547 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:53:36.548 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:53:36.549 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:53:36.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:53:36.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:53:36.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:53:36.551 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:53:36.551 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:53:36.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:53:36.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:53:36.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:53:36.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:53:36.554 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:53:36.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: a27657732b96d728dd6d0bd6fe88ab5da27b0361aa9bb00cf0afbb02d759bb76dca59966985f91a51cdb9054dd868649bb76fc98419a86bf84ee84113eddb512e7b4cfd131b18059dcc6585d666e01c8ff9b3cf956ef917b59440ac8339920c88c973072fb689aaef3f7651814b1ee5df3ba1d52c631509febd92937984b32bead369abd250cc88d1631f9d860cdbd1d6780aedb0ff6c489d88684e5c6a375e14ad493082dceb6c64d609cfe6d6627d7741ff6088cd8f82a396627431dede6ed8e4680850cb477d65b0562e6d7de6eb6e5c8537b2dd6fb64be535655fbc0eda9f46ab3ca52d84ae586092b7d366d1764fee749d24ecf5d533983faa9af8322839551503531b41182f7ca29739f8e5a2f3c53c64142a0e912e071cae63eb83609ae9e3c3d457236f94df44a7e7587b1d02d3dbe1fa372cf9bcacfd06543b7adaf22a09bf4c9b8390e2d848369106b38632ebfb0b6bbd9026ea525c7cd3723a527a86325b63841fe2479e65e2cb7b5b2304618e88ef32feb904765ba53d6f5ffad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:f7:be:c6:2f:db:18:60:4d:81:f5:68:47:db:a5:c0:7e:a7:12:bb] modulus: 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 public exponent: 10001 ] 2022-04-18 04:54:10.259 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:54:10.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:54:10.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 04:54:10.264 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:54:10.265 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 04:54:10.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:54:10.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:54:10.266 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:54:10.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:54:10.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:54:10.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:54:10.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:54:10.273 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:54:10.273 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:54:10.415 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:54:10.416 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:54:10.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:54:10.417 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:54:10.418 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:54:10.419 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:54:10.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:10.419 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:10.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:10.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:10.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:10.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:10.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:10.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:10.422 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:10.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:54:10.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: a27657732b96d728dd6d0bd6fe88ab5da27b0361aa9bb00cf0afbb02d759bb76dca59966985f91a51cdb9054dd868649bb76fc98419a86bf84ee84113eddb512e7b4cfd131b18059dcc6585d666e01c8ff9b3cf956ef917b59440ac8339920c88c973072fb689aaef3f7651814b1ee5df3ba1d52c631509febd92937984b32bead369abd250cc88d1631f9d860cdbd1d6780aedb0ff6c489d88684e5c6a375e14ad493082dceb6c64d609cfe6d6627d7741ff6088cd8f82a396627431dede6ed8e4680850cb477d65b0562e6d7de6eb6e5c8537b2dd6fb64be535655fbc0eda9f46ab3ca52d84ae586092b7d366d1764fee749d24ecf5d533983faa9af8322839551503531b41182f7ca29739f8e5a2f3c53c64142a0e912e071cae63eb83609ae9e3c3d457236f94df44a7e7587b1d02d3dbe1fa372cf9bcacfd06543b7adaf22a09bf4c9b8390e2d848369106b38632ebfb0b6bbd9026ea525c7cd3723a527a86325b63841fe2479e65e2cb7b5b2304618e88ef32feb904765ba53d6f5ffad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:fd:05:9a:1f:5e:04:c6:77:e9:1d:0b:2e:5b:fc:14:b4:71:38:f7] modulus: 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 public exponent: 10001 ] 2022-04-18 04:54:43.100 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:54:43.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:54:43.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-18 04:54:43.104 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:54:43.104 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-18 04:54:43.105 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:54:43.105 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:54:43.105 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:54:43.106 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:54:43.106 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:54:43.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:54:43.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:54:43.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:54:43.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:54:43.270 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:54:43.271 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:54:43.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:54:43.271 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:54:43.272 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:54:43.273 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:54:43.273 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:43.273 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:43.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:43.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:43.274 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:43.275 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:43.275 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:54:43.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:54:43.276 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:54:43.277 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:54:43.280 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:44:44:be:36:3e:d1:28:b0:7d:34:14:92:cd:fa:d3:0c:17:a9:31] modulus: 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 public exponent: 10001 ] 2022-04-18 04:56:50.780 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:56:50.781 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:56:50.782 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:56:50.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:56:50.785 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-18 04:56:50.786 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:56:50.786 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:56:50.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:56:50.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:56:50.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:56:50.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:56:50.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:56:50.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:56:50.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:56:50.978 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:56:50.978 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:56:50.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:56:50.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:56:50.980 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:56:50.981 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:56:50.981 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:56:50.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:56:50.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:56:50.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:56:50.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:56:50.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:56:50.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:56:50.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:56:50.985 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:56:50.985 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:56:50.988 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:58:7e:1b:a3:39:d6:53:da:47:40:5d:c7:d8:c2:04:96:0b:12:7d] modulus: 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 public exponent: 10001 ] 2022-04-18 04:57:37.884 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 04:57:37.885 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 04:57:37.886 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:57:37.887 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 04:57:37.887 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-18 04:57:37.887 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 04:57:37.888 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 04:57:37.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 04:57:37.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 04:57:37.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 04:57:37.893 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 04:57:37.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:57:37.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 04:57:37.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:57:38.022 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 04:57:38.022 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 04:57:38.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 04:57:38.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 04:57:38.024 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 04:57:38.024 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 04:57:38.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:57:38.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:57:38.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:57:38.025 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:57:38.026 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:57:38.026 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:57:38.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 04:57:38.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 04:57:38.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 04:57:38.028 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 04:57:38.031 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:a8:b6:db:0e:12:70:b7:ce:38:ff:1d:1f:7c:73:b1:be:a7:02:c3] modulus: c72f5d33624e6b200270c29e42fbeccda049364b669d89d155e18d6ecba82fa35469f5fb8712879d4b260784710f86638032d088fb647ca159699b28292f0f779fba810320d914490d5c9a58737e43b9454c5265c709bb7f5c92a9f430282603a39e66843be39bdd2881141a04d8cf91656334f8c9d0521893cef68cde5f255ba5b90d5d55598ae8f3b68aea56b78c98f254a0dd57ca9554863d1644658c0f041c2cacb21ecbfc91d7495ed6620051e1a077794b3047dfe1cd514b5cf15199d4a5b1e9fdbb7edd9f62699e01044bf14d4cfa4dfe7edf803814ae7c7f012f8eb3142936f31bcfbbcb252137d5b3a2669e01040486442e9c1e9cffb8c8d9fd88d7 public exponent: 10001 ] 2022-04-18 05:01:30.797 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 05:01:30.800 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 05:01:30.803 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 05:01:30.804 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 05:01:30.805 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-18 05:01:30.805 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 05:01:30.806 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 05:01:30.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 05:01:30.807 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 05:01:30.807 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 05:01:30.812 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 05:01:30.813 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 05:01:30.814 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 05:01:30.814 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 05:01:31.001 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 05:01:31.002 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 05:01:31.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 05:01:31.003 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 05:01:31.005 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 05:01:31.005 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 05:01:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:01:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:01:31.006 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:01:31.007 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:01:31.008 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:01:31.008 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:01:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:01:31.009 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:01:31.010 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:01:31.011 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 05:01:31.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:6d:82:91:b2:68:f4:ac:ec:85:11:70:a9:de:f6:48:bd:8c:83:db] modulus: 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 public exponent: 10001 ] 2022-04-18 05:02:05.165 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-18 05:02:05.167 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-18 05:02:05.169 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 05:02:05.169 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-18 05:02:05.170 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-18 05:02:05.178 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-18 05:02:05.180 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-18 05:02:05.181 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-18 05:02:05.182 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-18 05:02:05.183 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-18 05:02:05.190 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-18 05:02:05.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 05:02:05.191 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-18 05:02:05.192 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 05:02:05.349 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-18 05:02:05.351 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-18 05:02:05.351 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-18 05:02:05.352 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-18 05:02:05.353 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-18 05:02:05.354 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-18 05:02:05.356 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:02:05.357 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:02:05.357 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:02:05.357 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:02:05.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:02:05.358 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:02:05.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-18 05:02:05.359 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-18 05:02:05.360 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-18 05:02:05.361 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-18 05:02:05.365 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 251418854044444356913990487011830095768870452853 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 18 03:00:36 UTC 2022 Final Date: Sat Apr 17 03:00:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:a8:ec:92:4e:e2:d6:94:3b:cd:c8:b5:05:7b:43:fc:44:21:00:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e8a28909ec9d7eb0968adcaeabd329a4ae189a 56280f201a38272f0361d0c997fb62a8b610c95d 03e99054a76d172de994e2355631af8c36ce313a 98b2440966a7f14c5a03cc9f56c430eda7a3a000 8b0aff78dd7f2dc327ea12f04e2dea643c0e4161 68d4f8ed90f96089dc9fb8758f715c2734be89f2 166ab5bcfab1eb6e52e6d069dce9cedd47864b1c dc2b5d67b6a80d046eb344ca24f0a45d637909e2 37d6d8ede4e4cad026e35c9fcdaa7be4ac17f55b 11c9c34e382ee3b17d478bab9306e76298499193 739d71041abf68d09d962b127a1182f159045ff3 ed251f89280876e66260bf38e26d9c970afb86a7 b5d2ed9f3f9d4cc67ba2ac2aecaa686995ea66f4 358e26c5c39b9a6dd3ff62d4b07f877cc8dcf66d e385bc36ddc6cd0bec1d5e8b35ee36a6459920ad d893d6e14104dfdd0a7f6b7d96f2c80d40a6e36e 3782fa4b64fdf07e2cd722114e4da212a0732eab fe7083bfc124ef3a7ad455c1ee2b531831b07a0b 161c5d7b617446977cb5c74a19bfba71f2f15c0a bb0a5b7a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:cd:8a:2e:4a:56:bf:e4:4f:7a:fd:9a:bb:7a:e9:51:d2:9a:fc:44] modulus: e1bd37dcfd9029928c4bd4ec9b8eb9a5cbb845ef38f00ed99a3f2087067423d4ea1fec92bbe65d483c8c24fcf38ffbe4607d0387944a582bb31ccba132527db6ff7bb0f77981b01fad6f4ac7a9ffe46d00681b0b8f87043fb4a8431c5fc9a08bbe55c764f592f6169233897843d36efef23dc46927ba719730742125a8c815b44044c822a4aee54118d3533cf18f8ea2ddf08528e7240493e3b91e9d8ab20d948521efe4330f9f0beb41055e83ce888174d944807cd3a650028e7d383f758dd1cacd4395cd406b4ffc1fbdbe4118ec62133a524ff9f007000d7cef0e6f74353b20a4ebe97411326457f0411c20de71e79c6b8af7bc5864a452529f4e2e4a956d public exponent: 10001 ]