By type
2021-09-10 06:10:53,825 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-10 06:10:54,666 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-10 06:10:55.463 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-09-10 06:10:58.803 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-10 06:10:59.180 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-09-10 06:10:59.394 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-10 06:11:02.284 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.058 seconds (JVM running for 10.794) 2021-09-10 06:14:07.787 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 06:14:07.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 06:14:07.842 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-10 06:14:07.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 06:14:07.867 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-10 06:14:07.871 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 06:14:07.872 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 06:14:07.874 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 06:14:07.875 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 06:14:07.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 06:14:07.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 06:14:07.894 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 06:14:07.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 06:14:07.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 06:14:07.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 06:14:07.957 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 06:14:08.630 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 06:14:08.635 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 06:14:08.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 06:14:08.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 06:14:08.651 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 06:14:08.652 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 06:14:08.653 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.654 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.657 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.680 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.681 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.690 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.691 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.692 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.694 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 06:14:08.736 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:a8:90:fb:78:0c:c2:b3:65:7c:b4:2c:d0:39:37:a1:e5:55:6c:75] modulus: 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 public exponent: 10001 ] 2021-09-10 09:14:05.422 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:14:05.428 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:14:05.433 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-10 09:14:05.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:14:05.435 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-10 09:14:05.437 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:14:05.437 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:14:05.438 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:14:05.439 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:14:05.440 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:14:05.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:14:05.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:14:05.463 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:14:05.464 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:14:05.664 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:14:05.665 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:14:05.666 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:14:05.666 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:14:05.670 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:14:05.670 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:14:05.671 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.671 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.672 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.673 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.674 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.674 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.677 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.678 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.680 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:14:05.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:74:37:43:c6:9c:a0:ea:3f:28:a9:37:fb:14:99:60:69:f8:19:6e] modulus: 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 public exponent: 10001 ] 2021-09-10 09:18:02.054 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:18:02.067 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:18:02.069 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:18:02.072 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:18:02.073 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:18:02.076 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:18:02.076 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:18:02.077 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:18:02.077 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:18:02.078 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:18:02.090 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:18:02.091 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:18:02.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:18:02.092 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:18:02.261 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:18:02.262 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:18:02.263 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:18:02.263 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:18:02.266 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:18:02.266 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:18:02.267 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.267 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.267 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.270 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.270 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.271 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.272 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:18:02.279 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:68:32:04:dc:25:cc:e5:a2:c8:43:31:76:bf:14:d7:b3:52:91:2a] modulus: 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 public exponent: 10001 ] 2021-09-10 09:19:13.927 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:19:13.931 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:19:13.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:13.937 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:13.938 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:13.939 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:13.939 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:19:13.940 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:19:13.940 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:13.941 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:19:13.946 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:19:13.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:13.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:13.948 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:14.112 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:19:14.113 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:19:14.115 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:19:14.115 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:14.118 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:19:14.119 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:14.119 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.126 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.128 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:14.135 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:74:b8:29:d5:25:4a:44:4b:75:5e:33:eb:32:cd:2e:1f:dc:68:65] modulus: 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 public exponent: 10001 ] 2021-09-10 09:19:44.872 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:19:44.875 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:19:44.877 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-10 09:19:44.878 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:44.879 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-10 09:19:44.880 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:44.880 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:19:44.881 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:19:44.882 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:44.882 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:19:44.887 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:19:44.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:44.889 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:44.890 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:45.011 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:19:45.012 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:19:45.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:19:45.013 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:45.015 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:19:45.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:45.017 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.017 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.018 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.022 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:45.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:31:0e:66:df:dc:0d:e2:31:60:0c:d8:87:6d:0a:f0:39:e0:5c:bf] modulus: 9ad211fa5278425ea67d0d3455598f9dd9974d154311cc972d979520e234331eb4d5ceb62b6a64b2867144e1ea7f29d9ba36949c07a90146619ce7355bc351f9d50c778d25ce9b4ff626b8144749a1db5d5561f3f2597285b18ec4a42df419bad35c5835c961036d83155ab2ce1be94aad440f7d59e55d9f5e363e8aca2ba63b44015b19d9e0c9e038d4028815d330a4ca5c64859fa881277dd564e2c90acb33729dbed769231aa38f8b1effd51597b719e5137b1b707222b16c819ce7a8991448f47e7c94f9912802962fb9c72b73eb96f681e9de1f789439a695da620caf2ed9cb1ae53e416af463ea8ef2e2840121d19e8054d0373bc93889bbeea67f752d public exponent: 10001 ] 2021-09-10 09:19:55.031 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:19:55.035 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:19:55.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:55.037 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:55.038 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:55.040 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:55.040 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:19:55.047 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:19:55.048 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:55.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:19:55.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:19:55.058 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:55.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:19:55.059 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:55.177 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:19:55.178 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:19:55.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:19:55.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:55.181 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:19:55.184 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:55.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.187 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.188 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.189 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.189 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.190 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.191 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.191 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.193 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:55.211 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:89:a7:7c:fa:2b:66:28:33:1e:e4:81:fa:bb:9b:56:09:1f:db:b4] modulus: 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 public exponent: 10001 ] 2021-09-10 09:20:18.314 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:20:18.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:20:18.323 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-10 09:20:18.324 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:20:18.325 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-10 09:20:18.329 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:20:18.330 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:20:18.330 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:20:18.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:20:18.331 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:20:18.339 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:20:18.342 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:20:18.343 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:20:18.344 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:20:18.520 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:20:18.522 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:20:18.522 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:20:18.523 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:20:18.527 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:20:18.529 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:20:18.530 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.532 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.533 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.535 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.536 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.538 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.539 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.543 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.544 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:20:18.553 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:1e:2e:cf:44:45:61:34:aa:36:59:28:60:4e:0e:fa:96:8a:a5:56] modulus: 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 public exponent: 10001 ] 2021-09-10 09:22:25.759 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:22:25.763 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:22:25.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:22:25.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:22:25.767 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:22:25.774 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:22:25.775 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:22:25.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:22:25.777 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:22:25.778 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:22:25.785 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:22:25.786 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:22:25.787 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:22:25.787 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:25.963 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:22:25.963 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:22:25.964 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:22:25.964 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:25.966 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:22:25.967 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:22:25.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.968 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.969 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.972 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.973 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:22:25.978 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:09:df:4f:7f:bd:e9:07:dd:78:6f:c2:35:12:2f:a5:d2:24:41:8b] modulus: 98c14875f822031d12465b27608a18e87120ddb14bac3ec11e8405d11c59975197008ac83bdc5614fbdd39572856e64b66dd4a6b3d2f392b60949f3cfbdfbc7fb0839a4caeef02e0453c1cac129f4192ac319aa480b096515f85aaab49d69fdc48948c338e1e48f842df4d266fbd5b01d48073b02fc8f5565dcd69811dfae43af96f222aa66adfab2c8385e2fb11fb789547fb3b046399ec1660ce27cc0b38236f9eee3575467a839bbb4980e0a9b866db93b530c41febb6efac73e33263b354bb900000d00a58bdca95c007f08bd8c946049805dcba118a10aa3e0db55838d99bd07f394d1dc520ec9fda848ccf931fb64483ff0b3158ba5b414ae830e727a7 public exponent: 10001 ] 2021-09-10 09:22:47.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-10 09:22:47.026 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-10 09:22:47.027 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-10 09:22:47.028 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:22:47.029 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-10 09:22:47.030 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-10 09:22:47.030 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-10 09:22:47.030 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-10 09:22:47.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-10 09:22:47.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-10 09:22:47.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-10 09:22:47.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:22:47.041 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-10 09:22:47.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:47.166 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-10 09:22:47.167 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-10 09:22:47.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-10 09:22:47.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:47.169 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-10 09:22:47.170 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-10 09:22:47.170 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.174 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.175 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.175 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.176 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:22:47.181 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:36:d8:77:93:2f:01:36:97:e6:e5:f7:c5:0c:9f:1f:65:f6:7c:4d] modulus: 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 public exponent: 10001 ]