By type
2021-11-11 09:28:53,926 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-11 09:28:54,845 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-11 09:28:55.670 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-11 09:28:58.800 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-11 09:28:59.054 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-11 09:28:59.223 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-11 09:29:01.568 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.369 seconds (JVM running for 10.634) 2021-11-11 09:29:50.121 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 09:29:50.144 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 09:29:50.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-11 09:29:50.226 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 09:29:50.260 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-11 09:29:50.265 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 09:29:50.267 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 09:29:50.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 09:29:50.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 09:29:50.276 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 09:29:50.289 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 09:29:50.294 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 09:29:50.349 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 09:29:50.356 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 09:29:50.357 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 09:29:50.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 09:29:51.043 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 09:29:51.050 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 09:29:51.050 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 09:29:51.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 09:29:51.064 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 09:29:51.066 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 09:29:51.067 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 09:29:51.067 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 09:29:51.068 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 09:29:51.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 09:29:51.082 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 09:29:51.083 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 09:29:51.090 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 09:29:51.090 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 09:29:51.091 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 09:29:51.093 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 09:29:51.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:e2:33:78:52:33:8b:e4:2d:5c:e5:6b:2d:8e:87:3c:87:b4:b6:85] modulus: ed9599754ed3f077bf59d2ea084896253809245527111c1d7791612111aeed8c1d243d3da15e8ffadbe9cdf97f714f2595e53fa6981f6af28057c4258043fddb6aee2ceb4301b1523c1e003da8bff365c49f6c35131145096da21ec66f4f4176ca4975f868567f7029b5086ab6c93faf8beb9f0c046b9b3bd32603ede594278441d973cf1b0340edbc88f3f31556fd914d54bfb88e10b1b35dbb455f9aad2bb1e1fac529e6257fe3e4afbf65f91523e8d90b3f90da066cf88e18090b135bab04c7d31f09e156973dc997ecd002ae9db1f5dc69873be64c46955834c27dfcc42addaeaf3001419734bd7a36cc6222240f4954131534e9f4adb59feac454e35293 public exponent: 10001 ] 2021-11-11 11:26:47.510 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:26:47.515 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:26:47.519 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-11 11:26:47.521 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:26:47.523 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-11 11:26:47.525 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:26:47.525 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:26:47.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:26:47.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:26:47.527 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:26:47.536 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:26:47.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:26:47.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:26:47.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:26:47.688 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:26:47.689 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:26:47.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:26:47.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:26:47.695 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:26:47.695 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:26:47.696 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:26:47.697 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:26:47.697 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:26:47.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:26:47.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:26:47.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:26:47.701 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:26:47.701 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:26:47.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:26:47.703 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:26:47.710 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:f0:c8:ca:c7:dc:5b:3b:72:39:49:db:1c:71:9f:57:6f:24:d5:6a] modulus: bcba573e1e791c5053b4595e26af8f2d07937360fa120ae7d407234008b944c96c2ce080562aabd251667b5c9bda8d21df3688c3c3482debf8a4bbc29ea955d0347c30f6cbd378e7562965fd4c497b06f863030764b0c3147b197d6443d385fbf99879af2b28b5b854f57688cefe393e2f85313c91d9401317872153e6ebfb4f156012a50cda631b8cf7cb24df534dba373df5480cb76490ab34da4b16b344d38f152fe0d8df097a937246c7022ec44a1c1305f12f6b68fcfb7273468c1ae2c46e4859d6164c2d04ab73568e183c2a59abc52b5a81c753d1700826647b52e42fd02030862560344f8061829fbfc51c951482b4a170bdfe67dc09925f4afd7e41 public exponent: 10001 ] 2021-11-11 11:31:00.016 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:31:00.020 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:31:00.023 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 11:31:00.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:31:00.026 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 11:31:00.027 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:31:00.028 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:31:00.028 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:31:00.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:31:00.030 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:31:00.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:31:00.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:00.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:00.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:00.208 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:31:00.209 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:31:00.209 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:31:00.210 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:00.212 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:31:00.213 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:31:00.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:00.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:00.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:00.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:00.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:00.216 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:00.217 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:00.218 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:00.218 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:00.220 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:31:00.225 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:17:f0:02:eb:92:77:83:dc:a5:d0:db:cd:09:30:1b:d9:e9:82:7f] modulus: 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 public exponent: 10001 ] 2021-11-11 11:31:21.846 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:31:21.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:31:21.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 11:31:21.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:31:21.851 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 11:31:21.852 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:31:21.852 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:31:21.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:31:21.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:31:21.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:31:21.858 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:31:21.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:21.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:21.860 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:21.986 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:31:21.987 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:31:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:31:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:21.992 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:31:21.993 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:31:21.994 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:21.994 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:21.994 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:21.996 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:21.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:21.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:21.997 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:21.998 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:31:22.003 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:41:8c:d0:fb:d4:27:16:4c:be:d5:01:5b:04:16:4f:d2:ed:88:63] modulus: fb95e917d083cc9da7ddb9eb4ffd479c7ff447660e0d2293a7045674ed9bfc935646c16c6a8b8e66904b7218396228684fa24f700d6e87515fcb8e60d635b796fbe78284bc187f463693d80743a0aff9b232225bbb141558a0d616fdd864d882f621627dcae900dfa2d6f2621bdc1589c18b0c9c8a7bc553487e52ede776463be2a0a79e4335ef1b3517a46c718c41d95d6cf957529d34751aed0bda4980ebe2f30e4e2ea1958016dce436b14e2ddfebad32846fe6ec7c9f74d63e9d2db9dff1af728d4eda84b7cfa4235d14504a79dce85ebbce8dac38159b1b28c46e3afc6f39fc06116fda8ffcd57f442f54599936734c903b32d94ad527774fcd6e6bbe69 public exponent: 10001 ] 2021-11-11 11:31:54.376 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:31:54.377 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:31:54.379 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-11 11:31:54.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:31:54.381 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-11 11:31:54.382 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:31:54.383 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:31:54.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:31:54.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:31:54.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:31:54.390 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:31:54.391 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:54.391 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:31:54.392 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:54.521 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:31:54.523 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:31:54.523 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:31:54.524 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:31:54.526 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:31:54.526 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:31:54.527 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:54.527 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:54.528 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:54.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:54.529 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:54.530 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:54.531 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:31:54.531 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:31:54.532 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:31:54.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:31:54.537 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: cdccf8a60011faba1cc3208d1d416475f793ba9eda19484a2703050ea777d74991021b27afaa64e1f6cd9d5526c04cbe6a5f959d5a4912683ca5311bf58e8dfa509885e999a458216b9430bf205c15ff2ac2ae7565f2447504bd45654cd4d34755e5aec28d3f616d9631cd1364ab5ef66334ada58982db8ced27839239eb275023b5b7f2d4e976618daaf7215209bb0f58be2a494146a4523ee29284d721678e4478c052430d798c9ed4bd3d701e99f17b843053879f080bfd3b6998ff1902cac31421e4405ee85309ce1dc5a748f61b0cd4bc6c4813a16da30222fa222ab8b9e82043a36d706ee80a7b7683fdd5591501dba7ced782d517c361efcb5c45b74ebd2aa7836cff4fb3b43f95b823a542bb66677c395f020a3461f2a4a7bb918af39dbdfe6c6be0a7d94c84c5b1ec1738bd6e6a56631b8f2a659f72fd5bec4330955ff502b528d02ec2757ad82d737a73ae342819fb40cb51d98d4b5b4593bf8c8f7b7b5806fd1d5af2a95726f3b8fd72bdc0b963733473fd2b6ac2f55b264306e7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:9f:0f:08:5b:a5:40:aa:5b:46:d1:2f:61:59:57:19:2d:94:59:57] modulus: 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 public exponent: 10001 ] 2021-11-11 11:32:29.282 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:32:29.284 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:32:29.287 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-11 11:32:29.288 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:32:29.288 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-11 11:32:29.289 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:32:29.290 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:32:29.290 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:32:29.290 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:32:29.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:32:29.298 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:32:29.299 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:32:29.299 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:32:29.300 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:32:29.451 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:32:29.452 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:32:29.452 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:32:29.453 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:32:29.454 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:32:29.455 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:32:29.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:29.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:29.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:29.457 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:29.457 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:29.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:29.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:29.459 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:29.459 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:29.460 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:32:29.466 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:4b:93:be:7f:9e:60:6f:50:94:4b:73:f5:a4:2c:21:06:2d:fc:f9] modulus: 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 public exponent: 10001 ] 2021-11-11 11:32:33.377 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:32:33.379 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:32:33.380 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 11:32:33.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:32:33.382 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 11:32:33.382 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:32:33.382 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:32:33.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:32:33.383 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:32:33.384 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:32:33.388 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:32:33.389 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:32:33.389 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:32:33.393 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:32:33.493 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:32:33.494 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:32:33.494 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:32:33.494 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:32:33.496 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:32:33.497 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:32:33.497 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:33.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:33.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:33.498 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:33.499 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:33.499 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:33.500 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:32:33.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:32:33.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:32:33.502 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:32:33.506 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:65:ba:cc:fd:e1:c7:88:e2:db:b7:5f:58:29:ce:ab:08:41:98:08] modulus: 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 public exponent: 10001 ] 2021-11-11 11:34:14.912 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:34:14.915 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:34:14.918 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 11:34:14.919 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:34:14.920 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 11:34:14.921 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:34:14.921 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:34:14.922 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:34:14.922 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:34:14.923 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:34:14.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:34:14.929 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:34:14.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:34:14.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:34:15.112 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:34:15.114 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:34:15.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:34:15.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:34:15.117 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:34:15.117 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:34:15.118 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:15.118 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:15.119 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:15.120 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:15.120 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:15.121 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:15.121 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:15.122 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:15.122 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:15.123 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:34:15.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: cdccf8a60011faba1cc3208d1d416475f793ba9eda19484a2703050ea777d74991021b27afaa64e1f6cd9d5526c04cbe6a5f959d5a4912683ca5311bf58e8dfa509885e999a458216b9430bf205c15ff2ac2ae7565f2447504bd45654cd4d34755e5aec28d3f616d9631cd1364ab5ef66334ada58982db8ced27839239eb275023b5b7f2d4e976618daaf7215209bb0f58be2a494146a4523ee29284d721678e4478c052430d798c9ed4bd3d701e99f17b843053879f080bfd3b6998ff1902cac31421e4405ee85309ce1dc5a748f61b0cd4bc6c4813a16da30222fa222ab8b9e82043a36d706ee80a7b7683fdd5591501dba7ced782d517c361efcb5c45b74ebd2aa7836cff4fb3b43f95b823a542bb66677c395f020a3461f2a4a7bb918af39dbdfe6c6be0a7d94c84c5b1ec1738bd6e6a56631b8f2a659f72fd5bec4330955ff502b528d02ec2757ad82d737a73ae342819fb40cb51d98d4b5b4593bf8c8f7b7b5806fd1d5af2a95726f3b8fd72bdc0b963733473fd2b6ac2f55b264306e7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:21:f2:82:ba:31:2d:9b:dc:e2:bd:32:5c:93:45:27:d6:8c:60:0c] modulus: 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 public exponent: 10001 ] 2021-11-11 11:34:45.478 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-11 11:34:45.480 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-11 11:34:45.483 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-11 11:34:45.484 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 11:34:45.485 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-11 11:34:45.485 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-11 11:34:45.486 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-11 11:34:45.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-11 11:34:45.486 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-11 11:34:45.487 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-11 11:34:45.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-11 11:34:45.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:34:45.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-11 11:34:45.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:34:45.630 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-11 11:34:45.631 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-11 11:34:45.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-11 11:34:45.632 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 11:34:45.633 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-11 11:34:45.634 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-11 11:34:45.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:45.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:45.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:45.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:45.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:45.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:45.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 11:34:45.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-11 11:34:45.638 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-11 11:34:45.639 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 11:34:45.645 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184632397336514387693994359648090288294675755320 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 09:26:01 UTC 2021 Final Date: Tue Nov 11 09:26:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f7:e9:99:a1:3e:5c:49:ba:4a:f9:9e:46:45:8e:8f:06:b3:2f:f3:a0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b2140f9ae91e63bf86feb227ef9fd846bfcad a12373b44fa907f0f8e924519e0e1d9b083d2a91 5827a9e58d07bf3d49dd95f96f53cc96889c1c3f fea47dd1662f132a6c70846d921d5e9230acba55 06a55a85ad27407f1cd25263926deba3c294d667 3ca0691dee43507d311255b7567aecf09f09fa50 cc181a31e7ed5c09d1c57460fe3383a6a04b4f6e 74b643e4982a095b28b9738937a1a75d2a2720b2 3a4d48230af5e29e37c5375a19ca6d218d90c0c8 6be49a4a27e3bd9c7ee79c3f8f23cea3089f47f2 467f6554b02fe2ca51cdd6f9f3c862043bfd2485 bb2b5476feef9f8e7e3650a8a1bc0534dff7d865 377b3fc4e5715da62da96493861213ebcc7b0d71 5285a269b0377fb948dd40c29b3a2a2796d78bf4 569bfd4b4b418b96caf1417346bf4d5cf8cc66d9 6a7ed8443a4ea4b94a59d8ed4240b66497ac39c8 0dd2a46ad0e4fc45063f7d645723d9469ec6bef9 e969800bdb8749a2a07b29a5e70e5c9c22648a84 4f4be38e54a97a741db6ee8ecf2b78f2f86416d4 892a1f66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:40:0d:f4:eb:07:02:2c:a2:8c:05:c7:9d:4c:5f:5b:79:19:98:37] modulus: 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 public exponent: 10001 ]