By type
2021-11-05 10:06:34,947 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-05 10:06:35,791 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-05 10:06:36.865 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-05 10:06:40.285 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-05 10:06:40.574 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-05 10:06:40.715 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-05 10:06:42.821 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.576 seconds (JVM running for 10.259) 2021-11-05 10:07:22.583 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 10:07:22.606 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 10:07:22.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-05 10:07:22.685 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 10:07:22.718 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-05 10:07:22.722 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 10:07:22.723 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 10:07:22.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 10:07:22.726 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 10:07:22.731 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 10:07:22.750 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 10:07:22.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 10:07:22.823 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 10:07:22.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 10:07:22.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 10:07:22.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 10:07:23.511 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 10:07:23.515 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 10:07:23.515 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 10:07:23.518 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 10:07:23.528 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 10:07:23.529 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 10:07:23.530 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 10:07:23.531 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 10:07:23.531 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 10:07:23.544 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 10:07:23.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 10:07:23.545 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 10:07:23.552 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 10:07:23.553 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 10:07:23.554 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 10:07:23.556 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 10:07:23.596 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:25:82:27:3a:95:ae:4b:d2:b1:6a:d6:01:7c:c1:11:0d:d5:0b:f2] modulus: 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 public exponent: 10001 ] 2021-11-05 12:01:24.097 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:01:24.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:01:24.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-05 12:01:24.103 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:01:24.104 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-05 12:01:24.105 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:01:24.106 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:01:24.106 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:01:24.107 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:01:24.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:01:24.123 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:01:24.124 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:01:24.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:01:24.125 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:01:24.294 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:01:24.296 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:01:24.296 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:01:24.297 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:01:24.300 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:01:24.300 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:01:24.301 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:01:24.301 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:01:24.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:01:24.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:01:24.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:01:24.304 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:01:24.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:01:24.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:01:24.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:01:24.307 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:01:24.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:a3:0e:c7:22:ee:ad:76:d4:b3:43:52:57:b6:3f:4b:51:79:ed:5b] modulus: 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 public exponent: 10001 ] 2021-11-05 12:04:38.124 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:04:38.127 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:04:38.130 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-05 12:04:38.131 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:04:38.132 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-05 12:04:38.134 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:04:38.136 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:04:38.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:04:38.138 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:04:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:04:38.150 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:04:38.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:04:38.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:04:38.153 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:04:38.307 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:04:38.308 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:04:38.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:04:38.309 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:04:38.311 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:04:38.312 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:04:38.312 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:04:38.313 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:04:38.313 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:04:38.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:04:38.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:04:38.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:04:38.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:04:38.317 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:04:38.317 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:04:38.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:04:38.323 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:52:89:26:d3:ee:7a:95:44:b5:62:be:68:5c:c8:81:0f:19:9f:15] modulus: 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 public exponent: 10001 ] 2021-11-05 12:05:58.837 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:05:58.840 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:05:58.843 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-05 12:05:58.843 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:05:58.844 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-05 12:05:58.845 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:05:58.846 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:05:58.846 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:05:58.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:05:58.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:05:58.852 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:05:58.853 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:05:58.853 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:05:58.854 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:05:59.023 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:05:59.024 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:05:59.024 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:05:59.024 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:05:59.026 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:05:59.026 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:05:59.027 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:05:59.027 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:05:59.028 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:05:59.031 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:05:59.031 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:05:59.032 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:05:59.032 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:05:59.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:05:59.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:05:59.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:05:59.039 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:a7:21:f3:15:c1:3b:be:33:1b:33:1a:99:56:7b:96:5f:7d:6f:65] modulus: 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 public exponent: 10001 ] 2021-11-05 12:06:10.051 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:06:10.053 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:06:10.054 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-05 12:06:10.055 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:06:10.055 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-05 12:06:10.056 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:06:10.056 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:06:10.057 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:06:10.057 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:06:10.057 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:06:10.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:06:10.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:06:10.062 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:06:10.063 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:06:10.187 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:06:10.188 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:06:10.189 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:06:10.189 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:06:10.191 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:06:10.192 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:06:10.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:10.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:10.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:10.195 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:10.195 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:10.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:10.197 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:10.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:10.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:10.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:06:10.205 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:16:8a:79:8f:bc:6a:a8:61:c5:6b:8a:87:f0:d3:8e:08:15:b1:4f] modulus: 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 public exponent: 10001 ] 2021-11-05 12:06:30.587 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:06:30.589 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:06:30.590 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-05 12:06:30.591 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:06:30.592 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-05 12:06:30.593 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:06:30.594 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:06:30.594 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:06:30.595 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:06:30.596 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:06:30.601 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:06:30.602 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:06:30.602 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:06:30.602 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:06:30.747 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:06:30.748 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:06:30.748 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:06:30.749 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:06:30.750 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:06:30.750 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:06:30.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:30.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:30.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:30.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:30.753 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:30.753 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:30.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:06:30.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:06:30.755 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:06:30.755 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:06:30.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: da3af31914f53cc6628636631b46b3707541069d3de156c9c14475438afd04deb459ade7602d4b23620a35af980344aba73a2ff92a4d9d094ea0483a20d0334f19621a870c08b1151f76d433e2832c63fdaa255a6fae36d73897ca775b7f2495ab80bdc0950d3f1cf36f7452a67e15c17e57e4dbc6b64501e2438bad45309cc07886ea565dfb7556300034989fcd1162b3c92f73094c3f2bb768ef84589346b6ca1ae835a368180ea8c71b0909871adab9e7ecb9ceef8366c2cadff364acd40008607cf28638dd493736aeb8acb158159ca9630baa0f680644463968eeaffe5fdfa60223740f2e231be5de73bfc473fc9198178366a178a4f7641ad8e7068163eb0f88496c957eed38b61a2b244f1ce1c79de86007de330ba810298828e87c6ac07f20ff684f93c35a269cf027c621a74488c5b1929d88163f8b8a1fc3d0df78adda9b9b90b078bc31ab83f6baeb3667b876c938589904edcca0cd90d783740bdb28024eb4260f90f7b17c8a34de4c38d113ce9b5f5722f18b29e7c750fa5921 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:91:21:4e:e3:5a:89:67:02:00:84:38:e6:84:0f:da:f2:d7:0c:b2] modulus: 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 public exponent: 10001 ] 2021-11-05 12:07:07.171 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:07:07.172 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:07:07.174 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-05 12:07:07.175 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:07:07.175 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-05 12:07:07.176 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:07:07.177 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:07:07.177 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:07:07.177 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:07:07.178 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:07:07.182 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:07:07.183 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:07:07.183 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:07:07.184 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:07:07.285 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:07:07.286 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:07:07.286 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:07:07.287 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:07:07.288 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:07:07.288 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:07:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:07:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:07:07.289 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:07:07.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:07:07.290 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:07:07.291 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:07:07.291 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:07:07.292 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:07:07.292 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:07:07.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:07:07.296 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: da3af31914f53cc6628636631b46b3707541069d3de156c9c14475438afd04deb459ade7602d4b23620a35af980344aba73a2ff92a4d9d094ea0483a20d0334f19621a870c08b1151f76d433e2832c63fdaa255a6fae36d73897ca775b7f2495ab80bdc0950d3f1cf36f7452a67e15c17e57e4dbc6b64501e2438bad45309cc07886ea565dfb7556300034989fcd1162b3c92f73094c3f2bb768ef84589346b6ca1ae835a368180ea8c71b0909871adab9e7ecb9ceef8366c2cadff364acd40008607cf28638dd493736aeb8acb158159ca9630baa0f680644463968eeaffe5fdfa60223740f2e231be5de73bfc473fc9198178366a178a4f7641ad8e7068163eb0f88496c957eed38b61a2b244f1ce1c79de86007de330ba810298828e87c6ac07f20ff684f93c35a269cf027c621a74488c5b1929d88163f8b8a1fc3d0df78adda9b9b90b078bc31ab83f6baeb3667b876c938589904edcca0cd90d783740bdb28024eb4260f90f7b17c8a34de4c38d113ce9b5f5722f18b29e7c750fa5921 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:3c:b9:a7:cd:18:ef:cd:8e:60:97:b9:2b:bd:85:65:ee:bf:80:8d] modulus: 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 public exponent: 10001 ] 2021-11-05 12:08:25.300 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:08:25.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:08:25.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-05 12:08:25.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:08:25.308 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-05 12:08:25.309 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:08:25.310 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:08:25.310 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:08:25.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:08:25.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:08:25.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:08:25.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:08:25.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:08:25.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:08:25.474 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:08:25.475 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:08:25.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:08:25.476 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:08:25.477 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:08:25.477 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:08:25.478 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:25.478 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:25.478 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:25.479 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:25.479 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:25.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:25.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:25.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:25.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:25.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:08:25.486 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:da:b4:0d:56:47:b5:2b:7d:c0:96:ed:eb:5e:88:07:df:18:b3:a8] modulus: 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 public exponent: 10001 ] 2021-11-05 12:08:50.910 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-05 12:08:50.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-05 12:08:50.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-05 12:08:50.913 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-05 12:08:50.914 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-05 12:08:50.915 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-05 12:08:50.915 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-05 12:08:50.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-05 12:08:50.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-05 12:08:50.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-05 12:08:50.921 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-05 12:08:50.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:08:50.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-05 12:08:50.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:08:51.022 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-05 12:08:51.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-05 12:08:51.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-05 12:08:51.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-05 12:08:51.025 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-05 12:08:51.026 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-05 12:08:51.026 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:51.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:51.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:51.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:51.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:51.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-05 12:08:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-05 12:08:51.030 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-05 12:08:51.031 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-05 12:08:51.034 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527925446892117646957475581253424097238858173622 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 05 10:03:27 UTC 2021 Final Date: Wed Nov 05 10:03:26 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:48:cb:c3:8b:81:ea:60:47:cb:23:7e:25:b2:af:85:c2:33:64:d5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: bfc52f2ce4ef1915eb92789c4315af0931739a03 5988db1b68fb6d7f70b8c75041508fcc32219248 dcdf20dc2b8cc7b052e5cb51a176fa7e8638eaaf 67040f887b91204092ec110fcdef5a6aa9c51f3c 04572a9750b251036507b6995d5561cf905cc644 637bf20c7e99ebe0b7c3bab67ef17448a1204826 4ff565eac7e5a1484ecd223e5a8bd4f5356626a9 184c5eb6bad99c80595dd856b107f96c092efbb5 8302876fbcf20b34518463f1d2b9b8d1afd1d04c ffb2d54ab8b674ec45768a4c5d9249e02887fa01 8f586aeb333f863c05b8b80a851e5d99e24efa90 bc42d792bd8b93c4fa135fe426a84ea80d65c2ec 69c1e1df9d7dbb0709067064bf1a6bd1bb7a1cba df618beec416d03ff1ad9bcd7c3536f842f4fc56 5a085c432523c42143a88d135351f92a68aa2196 7ed545f08b439bd2205dd71374702183b6793dd9 f7c174a6ac01d5099283b3cc57472ae0992e723e b658699cca4078859c6f72e7f2be2943e647ea7d f51efc467c9f05aadc315aae6cc43c65c02d6761 cc4e26d9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:b8:d1:16:09:ab:ef:ae:05:ab:b2:b1:23:a9:ec:1e:a5:c5:d7:29] modulus: d775100390f25ebe7eef37df9436fd3e5bf4cd8d13f3bd7b8eec9055de7b4b46417d9896ebb14d989e19461b781ddee11b5f065950318cda80eb35f480cd7ff79685f0534ac071bf9e84e08c9792ca3049cdb6bcab09d12f36312f571761b2ee005d1bae83cf3d5eb8e0382565b802f1a9028214044db51125e7a737d5620f274527d72b3a125cd17d42f85871fa405b297bf2187c6d72033580480d157b06c107066df043bf2158de4bbcbc351b21db9cf13a85a05472c6088c45d768f002d4d21d8d2fd8fad8b59888239981b8b6bdb4ae4d5b59e54ff5fe3589a8c060305cc0deb4b0c0dfdbee18cc9e102b4eb56eb9038e360c5648d75e19a6d705aa6f5d public exponent: 10001 ]