By type
2021-11-12 01:58:03,309 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-12 01:58:06,835 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-12 01:58:09.516 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-12 01:58:21.216 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-12 01:58:22.530 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-12 01:58:23.118 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-12 01:58:33.528 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 32.111 seconds (JVM running for 38.272) 2021-11-12 01:59:23.826 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 01:59:23.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 01:59:24.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 01:59:24.019 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 01:59:24.113 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 01:59:24.117 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 01:59:24.117 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 01:59:24.119 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 01:59:24.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 01:59:24.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 01:59:24.131 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 01:59:24.212 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 01:59:24.327 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 01:59:24.414 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 01:59:24.415 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 01:59:24.418 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 01:59:25.636 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 01:59:25.639 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 01:59:25.640 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 01:59:25.711 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 01:59:25.719 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 01:59:25.721 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 01:59:25.721 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.722 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.722 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.817 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.818 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.824 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.825 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.825 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.827 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 01:59:26.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: af3a0d52a8c2e7f578a6aca1a5c84cbc47b4a37cbf77077c90d12d185ad0a18b1fcad102b95abba070b45ccb1aa469f92eed36c8130fdf6d9149651e27ce800631ce32e19166a892973db4d85f4b621bde78781de384fcc9ea13c5ea28fc348105f58fc67e633681cd29a1248eb438c85437e915402a65e9e785c1b4f498c49044c0e35a321de31fd2bbeb1a6e0e389f4e37d7e5bf7ee7ef87fdfcaf41526313634739e1315cf97220828131f01fb717a3dd2b91ee02167cb940f029c1a61f70db0a7c7569b0f393018906f562f0b3185490cb90bd58ca59c7fda16e28e862c8e855d296da87ccf7a5769701e8053ce4fc4497087ec1671480dea182bfb76e1a893218be81e5bc743a1ab4fabff2a6bda864d76cc33749e53b080cb883402563b41ce445ee9bc1c0081b5256a8aeb1568cd0fccd91cb9c8f7f3548aad38e4ecf5ed700a6ae7ac9b057b934dfc50763a83a3613b3878edc21cf9d272f2f2c58b8c90162383fc20415966d6f9b33e9e3ec3d5f29a54fea6aad3055955b1998f3b3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:1f:87:99:5f:d1:18:5a:0c:44:69:94:4a:8a:41:9e:bb:01:9c:7f] modulus: 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 public exponent: 10001 ] 2021-11-12 03:57:45.063 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 03:57:45.065 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 03:57:45.067 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 03:57:45.068 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 03:57:45.069 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 03:57:45.070 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 03:57:45.070 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 03:57:45.071 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 03:57:45.071 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 03:57:45.072 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 03:57:45.116 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 03:57:45.117 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 03:57:45.117 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 03:57:45.118 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 03:57:45.327 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 03:57:45.327 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 03:57:45.328 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 03:57:45.328 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 03:57:45.332 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 03:57:45.333 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 03:57:45.333 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.335 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.336 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.336 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 03:57:45.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:55:39:e4:15:f7:a9:f7:60:7a:67:0c:92:cb:b5:75:b2:10:0d:7c] modulus: d7171d2a30d42ee7a6a72ad7d9aa700e219639d1fc3f51face1dd4b57273cb327cf5ab04702f6605e57c458f1945e6de9eadb8571df420f93a92504b9074adf794bc77eb53ea5cff35bd2f8a62f054b1a4a478589a0e902de7fd96ea9a6fe0941d2ad136853d2c313006bcc38470408edc3c610d8dd9e2fc6ed2975afe6c2fdf105b7d01350000d45d32edea3a4a6376ba2ce944b67305ecbbcf312b2ac93dec2bcb4269a511b7650b9653c8d9b2ef2eac2f03c4ff7ec6167ae99680a68af1ca08c7a1e5ef37a60308e3904067dd93c116ab737b0485c211853202c99dde5e1d0780fa472b69a338e976cdf03b02f56bcd40e33e055a379708b78c5512094823 public exponent: 10001 ] 2021-11-12 04:02:22.871 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:02:22.873 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:02:22.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:02:22.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:02:22.875 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:02:22.876 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:02:22.877 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:02:22.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:02:22.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:02:22.878 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:02:22.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:02:22.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:02:22.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:02:22.884 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:22.989 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:02:22.990 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:02:22.990 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:02:22.990 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:23.011 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:02:23.012 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:02:23.013 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.013 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.013 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.015 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.017 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:02:23.020 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:37:8f:fb:3d:94:b8:06:2d:f5:3a:9f:0b:cd:2b:02:6f:f8:a7:09] modulus: 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 public exponent: 10001 ] 2021-11-12 04:02:55.926 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:02:55.927 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:02:55.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:02:55.929 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:02:55.929 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:02:55.930 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:02:55.930 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:02:55.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:02:55.931 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:02:55.931 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:02:55.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:02:55.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:02:55.936 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:02:55.936 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:56.109 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:02:56.109 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:02:56.110 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:02:56.110 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:56.112 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:02:56.112 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:02:56.112 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.113 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.113 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.114 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.115 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.116 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.117 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:02:56.120 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:6a:e7:72:c4:bc:e1:f6:9b:74:60:67:4d:2d:64:b3:47:14:c1:97] modulus: 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 public exponent: 10001 ] 2021-11-12 04:03:27.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:03:27.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:03:27.977 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:03:27.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:03:27.978 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:03:27.979 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:03:27.979 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:03:27.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:03:27.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:03:27.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:03:27.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:03:27.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:03:27.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:03:27.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:03:28.081 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:03:28.082 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:03:28.082 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:03:28.083 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:03:28.084 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:03:28.084 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:03:28.085 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.085 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.086 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.086 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.087 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.087 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.088 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.088 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.089 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.089 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:03:28.092 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:17:3a:c5:6c:6d:76:88:d2:72:ad:69:5c:71:57:7d:65:b0:0b:92] modulus: c5c99c09c5e36a9ca569cafb62a1bb5ec0b98085422f0cc65022c2fec23f844748b734e47180b457e8b43bf26bcb7c80099fd68bab77f5aefb0f8e7b2fab0982140e56061025fec7d8f62e0bf20fffc0bfe28fb552ad1b189b37895608666b6cedf735d69fc93b687aaf29f5bd869bc4a97c5a90596ae944f46ce3c02d224f2325835beea5a19e7cca8e4c8776477bdaa6e3d8f4e029d1edaf235919ecffd874b060fc7eaa63911a2df5f9280fd108e9c6c308bbcddb829473b89eb6509c4446064cf5b6a2c118b7110978f71e5eede21f81fb9fcbe73cfb913819e288c0eade30254da2d3cf1608a007379db29a28eb474519086040fc30d255903630e64c3b public exponent: 10001 ] 2021-11-12 04:04:07.303 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:04:07.304 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:04:07.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:04:07.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:04:07.306 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:04:07.307 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:04:07.307 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:04:07.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:04:07.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:04:07.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:04:07.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:04:07.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:04:07.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:04:07.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:04:07.386 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:04:07.387 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:04:07.387 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:04:07.387 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:04:07.409 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:04:07.410 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:04:07.410 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.410 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.410 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.413 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:04:07.415 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:08:9a:ac:ac:60:1d:56:3b:85:65:7e:7e:c3:59:1c:a4:79:98:5a] modulus: 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 public exponent: 10001 ] 2021-11-12 04:05:12.941 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:05:12.942 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:05:12.943 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:05:12.943 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:05:12.943 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:05:12.944 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:05:12.944 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:05:12.944 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:05:12.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:05:12.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:05:12.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:05:12.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:05:12.950 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:05:12.950 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:05:13.085 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:05:13.086 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:05:13.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:05:13.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:05:13.109 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:05:13.109 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:05:13.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.110 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.110 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.110 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.111 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:05:13.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: af3a0d52a8c2e7f578a6aca1a5c84cbc47b4a37cbf77077c90d12d185ad0a18b1fcad102b95abba070b45ccb1aa469f92eed36c8130fdf6d9149651e27ce800631ce32e19166a892973db4d85f4b621bde78781de384fcc9ea13c5ea28fc348105f58fc67e633681cd29a1248eb438c85437e915402a65e9e785c1b4f498c49044c0e35a321de31fd2bbeb1a6e0e389f4e37d7e5bf7ee7ef87fdfcaf41526313634739e1315cf97220828131f01fb717a3dd2b91ee02167cb940f029c1a61f70db0a7c7569b0f393018906f562f0b3185490cb90bd58ca59c7fda16e28e862c8e855d296da87ccf7a5769701e8053ce4fc4497087ec1671480dea182bfb76e1a893218be81e5bc743a1ab4fabff2a6bda864d76cc33749e53b080cb883402563b41ce445ee9bc1c0081b5256a8aeb1568cd0fccd91cb9c8f7f3548aad38e4ecf5ed700a6ae7ac9b057b934dfc50763a83a3613b3878edc21cf9d272f2f2c58b8c90162383fc20415966d6f9b33e9e3ec3d5f29a54fea6aad3055955b1998f3b3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:78:f1:94:c0:3e:5c:7d:e2:c2:97:eb:c4:41:74:3b:1f:f1:5b:47] modulus: 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 public exponent: 10001 ] 2021-11-12 04:07:20.798 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:07:20.799 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:07:20.803 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:07:20.804 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:07:20.804 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:07:20.805 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:07:20.805 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:07:20.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:07:20.805 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:07:20.806 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:07:20.812 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:07:20.812 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:07:20.812 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:07:20.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:07:20.896 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:07:20.897 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:07:20.897 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:07:20.897 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:07:20.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:07:20.899 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:07:20.899 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.901 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.902 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:07:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:17:a3:21:1e:37:a4:50:bd:44:a9:ed:de:d8:bd:8b:81:4e:c7:f0] modulus: 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 public exponent: 10001 ] 2021-11-12 04:08:53.788 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:08:53.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:08:53.791 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:08:53.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:08:53.792 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:08:53.793 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:08:53.793 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:08:53.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:08:53.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:08:53.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:08:53.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:08:53.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:08:53.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:08:53.800 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:08:53.909 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:08:53.910 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:08:53.911 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:08:53.911 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:08:53.912 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:08:53.912 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:08:53.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.913 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.914 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.915 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.916 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:08:53.919 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:a1:8c:82:6c:d0:f3:50:f7:4c:9c:00:6c:df:9f:15:e4:b8:47:6c] modulus: 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 public exponent: 10001 ]