By type
2022-03-14 02:44:53,662 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-14 02:44:57,373 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-14 02:44:59.561 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Mar 14, 2022 2:45:07 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 14, 2022 2:45:07 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 14, 2022 2:45:07 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 14, 2022 2:45:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-14 02:45:09.661 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-14 02:45:10.666 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-03-14 02:45:11.274 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-14 02:45:13.968 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-14 02:45:13.971 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-14 02:45:13.972 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-14 02:45:13.975 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-14 02:45:14.166 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-14 02:45:14.168 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-14 02:45:14.570 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-03-14 02:45:18.370 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 14, 2022 2:45:21 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-14 02:45:22.081 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 31.417 seconds (JVM running for 37.457) Mar 14, 2022 2:45:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-14 02:45:56.565 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 02:45:56.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 02:45:56.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-14 02:45:56.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 02:45:56.761 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-14 02:45:56.763 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 02:45:56.764 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 02:45:56.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 02:45:56.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 02:45:56.769 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 02:45:56.774 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 02:45:56.777 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 02:45:56.880 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 02:45:56.884 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 02:45:56.958 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 02:45:56.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 02:45:57.960 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 02:45:57.962 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 02:45:57.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 02:45:57.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 02:45:57.971 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 02:45:57.972 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 02:45:57.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 02:45:57.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 02:45:57.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 02:45:58.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 02:45:58.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 02:45:58.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 02:45:58.070 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 02:45:58.071 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 02:45:58.071 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 02:45:58.072 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 02:45:58.169 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:26:3e:cd:d5:91:04:a6:0f:7e:c4:de:6c:c3:16:af:58:1c:c2:53] modulus: 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 public exponent: 10001 ] 2022-03-14 04:25:18.755 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:25:18.756 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:25:18.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:25:18.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:25:18.759 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:25:18.759 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:25:18.760 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:25:18.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:25:18.760 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:25:18.761 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:25:18.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:25:18.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:25:18.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:25:18.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:25:18.972 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:25:18.972 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:25:18.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:25:18.973 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:25:18.975 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:25:18.975 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:25:18.976 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:25:18.976 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:25:18.976 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:25:18.977 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:25:18.978 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:25:18.978 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:25:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:25:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:25:18.979 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:25:18.980 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:25:18.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:a5:61:b4:ec:13:38:3f:9f:cf:5e:34:74:9e:93:4f:df:72:a0:16] modulus: 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 public exponent: 10001 ] 2022-03-14 04:29:35.274 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:29:35.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:29:35.276 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:29:35.277 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:29:35.278 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:29:35.278 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:29:35.279 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:29:35.279 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:29:35.279 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:29:35.280 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:29:35.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:29:35.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:29:35.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:29:35.291 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:29:35.453 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:29:35.454 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:29:35.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:29:35.454 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:29:35.460 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:29:35.460 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:29:35.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:35.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:35.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:35.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:35.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:35.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:35.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:35.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:35.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:35.464 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:29:35.467 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:5d:32:0d:02:5d:8e:ee:e3:12:be:39:0f:67:a4:6e:7f:bf:c9:f2] modulus: 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 public exponent: 10001 ] 2022-03-14 04:30:07.362 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:30:07.363 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:30:07.364 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:30:07.364 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:30:07.365 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:30:07.365 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:30:07.365 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:30:07.366 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:30:07.366 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:30:07.366 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:30:07.370 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:30:07.371 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:30:07.371 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:30:07.371 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:30:07.450 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:30:07.451 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:30:07.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:30:07.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:30:07.458 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:30:07.459 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:30:07.459 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:07.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:07.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:07.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:07.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:07.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:07.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:07.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:07.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:07.463 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:30:07.465 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: b8d3114f20b95491fde766c395efe43dc5841e811fe446eaa47cb22bc68bec25f0491010f54b775323c552c486e2745370781e67e7d705b3d2dfbf575fb7eb4b8f29ce6c09c8a352ff11280f49140d4582e4e178d5c2d0675d694ea1fff6bdfc4d9bdd02039cab81fee7c0f42ab3be08e67587df7278c538d6e708cde11b13d22bd3c977a6d5020467dc357fda98b25139485201e6bfba6addad24d0ba3d1ec34df05cdc09ac940b5b9131f57d3ac501bcf634dbe53a14f43f09b8a1f46987188e77f3b9b0579aaf07355206b8cd5f671386c30dcbafdb6dc41891f54de23d82e88100b59c3ab7f01efae24acae58e1f68aa59d07e017f05ab524490abea0a52d8f7f9803aaea886e889a3865903b514f2eff43295aec9af02e1b3959075dca113b7e8cd77af372e0046ac4cee0b5626f4c4df3b1e0109c675bb5d63a4677d5082681e546fc47c91bbb2bcf3ad376f146ba2ccd8e9fedc9e286693a58e029423ee74b6e489cfd9130fd8d043ab9f76ee984a3ab3e1f61688b62124821ff40b61 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:98:59:1e:a7:ac:db:f8:73:c4:0a:6d:07:fb:ab:a9:5f:c2:e0:dd] modulus: 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 public exponent: 10001 ] 2022-03-14 04:30:40.262 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:30:40.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:30:40.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:30:40.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:30:40.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:30:40.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:30:40.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:30:40.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:30:40.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:30:40.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:30:40.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:30:40.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:30:40.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:30:40.273 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:30:40.351 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:30:40.352 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:30:40.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:30:40.352 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:30:40.359 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:30:40.360 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:30:40.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:40.360 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:40.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:40.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:40.361 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:40.362 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:40.362 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:30:40.362 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:30:40.363 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:30:40.363 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:30:40.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:25:eb:23:f2:90:ac:8e:cb:1e:74:c5:f6:c3:86:67:7e:86:0c:51] modulus: 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 public exponent: 10001 ] 2022-03-14 04:32:45.470 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:32:45.472 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:32:45.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:32:45.473 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:32:45.473 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:32:45.474 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:32:45.474 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:32:45.474 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:32:45.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:32:45.475 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:32:45.479 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:32:45.480 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:32:45.480 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:32:45.480 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:32:45.554 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:32:45.554 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:32:45.554 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:32:45.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:32:45.556 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:32:45.556 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:32:45.556 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:32:45.558 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:32:45.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:32:45.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:32:45.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:32:45.559 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:32:45.560 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:32:45.560 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:32:45.560 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:32:45.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:32:45.564 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:64:e5:35:03:ab:76:33:85:45:86:8a:0e:42:4d:60:4c:73:97:c4] modulus: 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 public exponent: 10001 ] 2022-03-14 04:45:52.495 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:45:52.496 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:45:52.497 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:45:52.497 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:45:52.498 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:45:52.498 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:45:52.498 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:45:52.498 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:45:52.499 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:45:52.499 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:45:52.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:45:52.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:45:52.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:45:52.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:45:52.586 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:45:52.586 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:45:52.586 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:45:52.586 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:45:52.587 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:45:52.588 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:45:52.588 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:45:52.588 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:45:52.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:45:52.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:45:52.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:45:52.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:45:52.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:45:52.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:45:52.591 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:45:52.591 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:45:52.593 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:a5:b5:ed:e8:21:ab:11:23:86:9c:7c:b4:df:48:bb:0b:9c:57:93] modulus: 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 public exponent: 10001 ] 2022-03-14 04:47:04.938 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:47:04.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:47:04.940 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:47:04.941 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:47:04.941 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:47:04.941 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:47:04.942 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:47:04.942 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:47:04.942 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:47:04.942 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:47:04.946 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:47:04.947 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:47:04.947 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:47:04.947 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:47:05.035 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:47:05.035 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:47:05.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:47:05.036 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:47:05.059 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:47:05.059 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:47:05.059 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:47:05.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:47:05.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:47:05.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:47:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:47:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:47:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:47:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:47:05.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:47:05.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:47:05.065 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:ce:3b:ce:59:12:90:ed:7e:dd:27:4b:c0:22:07:ad:6f:d3:fb:21] modulus: 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 public exponent: 10001 ] 2022-03-14 04:48:36.922 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-03-14 04:48:36.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-03-14 04:48:36.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-14 04:48:36.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:48:36.924 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-14 04:48:36.925 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-03-14 04:48:36.925 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-03-14 04:48:36.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-03-14 04:48:36.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-03-14 04:48:36.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-03-14 04:48:36.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-03-14 04:48:36.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:48:36.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-03-14 04:48:36.930 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:48:37.059 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-03-14 04:48:37.059 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-03-14 04:48:37.060 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-03-14 04:48:37.060 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:48:37.061 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-03-14 04:48:37.061 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-03-14 04:48:37.061 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:48:37.061 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:48:37.062 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:48:37.062 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:48:37.062 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:48:37.062 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:48:37.063 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:48:37.063 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:48:37.063 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:48:37.064 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:48:37.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 598128717490802338174607432566200878054319817026 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:41:06 UTC 2022 Final Date: Sat Mar 13 02:41:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:3b:f3:ea:68:83:0e:d4:19:98:52:e1:4f:72:99:bf:cf:47:1d:8c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07a424368669653e92d5097e48e70e76bed566bb 3514c83b9303c74327ff080a0c8dc51ddf0daa63 c2f75a01fda697a1637ee0e13bd59a00e6646aa7 a7b56e20564df51a00af781bed17e3c74e4aaef1 66a4d57a01e757d21c296189204201d8a6091703 8529023bb45fc52df06e2e38fad24b07d7b035f4 479b0a6961bf23a42a4bbdf2ae554269e1af84d5 8b5567cc665844337a203b8b6c7cc7281470d532 55056830beb0074d54b3fe3480ced4b178673ec1 844a9ba9b05354cfe45a573d66df77b4a9152c60 e8cb9cbd6b76c601d7647f67db7d2568d6a3036a 765da1916e9930c39a0517b9769a8314c1e65033 0b13a062f42c4b66e3353926960446dfbc4e3e15 934da5b99e37efb07dcd21361d39e93708f9eb96 82c2ffc34051ea109537acac70c355049770c63c cf90e97019c3e1f93426d165a7b6d7cb848abb03 3e7f6db25f491c7215e5aae219c4ff3077b8d705 00576d91097847d671b623e3af4b83a7f6b3c3c4 5e6b4493b004d016dc352c7698ecd5176c637b82 c1349d2d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:d8:5a:9d:16:b9:da:14:96:2b:bb:4c:1a:2a:74:5c:09:79:22:7b] modulus: e5a2eebe06df0068b4100e89811d7cb1d58a9bf90ef9add1944b9b906ef760d0bbc1e16b9a85c3e5dfb12dc1bbdd3fcbc38eca5f40f5f1eaf0629a940453239ef1b80f3dc05617a183f3fcc6330d77a0da09cc9ac12f5c32811001500b1c87c6d6457a605cd8b48f01d6a8ded9aeccbd62b353cac64c3a95aad80fde4ba4b0895f3aca2b7ef9e720d1fa7b5a42876d3571c33341affb0854df22a39b6dfb7da22feda3c8527f12263ce19bbfee5bef7af93831d8283e1322c265ae27dbe7f11c177bd5d5f1b77f0fda9a8046c4aea3eff41316d8fcff6f5fe852cfe82cd0588ac1638f7d75b8994849e3904252d1f2803a898fd98c21b1c2fd36fb2f17bf91b7 public exponent: 10001 ]