By type
2021-09-12 06:04:48,586 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-12 06:04:49,394 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-12 06:04:50.077 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-09-12 06:04:52.946 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-12 06:04:53.173 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-09-12 06:04:53.307 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-12 06:04:55.374 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.362 seconds (JVM running for 9.052) 2021-09-12 06:08:27.154 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 06:08:27.167 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 06:08:27.214 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-12 06:08:27.218 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 06:08:27.239 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-12 06:08:27.243 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 06:08:27.244 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 06:08:27.247 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 06:08:27.248 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 06:08:27.253 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 06:08:27.261 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 06:08:27.264 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 06:08:27.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 06:08:27.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 06:08:27.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 06:08:27.314 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 06:08:27.902 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 06:08:27.907 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 06:08:27.908 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 06:08:27.911 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 06:08:27.921 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 06:08:27.922 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 06:08:27.923 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 06:08:27.924 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 06:08:27.924 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 06:08:27.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 06:08:27.938 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 06:08:27.939 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 06:08:27.945 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 06:08:27.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 06:08:27.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 06:08:27.948 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 06:08:27.979 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:76:dd:ac:6c:b6:de:42:12:dc:9c:e9:18:cd:3d:3a:d9:6f:c7:9c] modulus: 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 public exponent: 10001 ] 2021-09-12 08:40:01.634 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:40:01.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:40:01.640 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-12 08:40:01.641 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:40:01.642 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-12 08:40:01.643 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:40:01.644 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:40:01.644 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:40:01.645 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:40:01.645 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:40:01.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:40:01.659 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:40:01.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:40:01.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:40:01.854 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:40:01.855 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:40:01.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:40:01.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:40:01.862 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:40:01.862 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:40:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:40:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:40:01.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:40:01.865 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:40:01.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:40:01.866 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:40:01.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:40:01.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:40:01.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:40:01.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:40:01.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: c2790c470fe2dc99d493cbeabe4815b0c37f0d1afa4a7bb061d38872eb81a84d5a1bedb349152cb5ee41d5a05dabcaa11bc0ee98a09c526aa1002397371fd4420c4b1f62ba1d465e5e3e7252730a8d37966c83523fbbb573ca62e3ab02b6db5005f085aef81821f3f86d8c38b29d63b3f350bd84014a5ab93394de01f06b689915e7a6b16458a1626fbfdbc6682fe96e4fecdd28bb92be598767fa1a562c296b9005ef5aaf0fe61c9540513d4426f0a0669524217e488357e5667c151fff475e23831c5ecb17ee1545daa6bf8f2140e10bef6346220366024d5a46df23a91051788b71e6db6eeb7e987062ffe0d1d677cb003da9f8aa340d31f2ba253d11b7f065db6c7a6e11aaf87ac51c82c4299a44ba651fb72d40dbaa60f9168c49f647bdb9d085ee018dcaf65253475886f521e82538168940a220a8178f8977c2151aca2c26b2b06e959583428a98bfe282ecbd51f39ed0159ca329bd3827a5e45ad7ca9dc4271be6fb909d340e25088b1bafa9dcd21bcb11bb1908e6c9e4efc530308d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:9b:93:92:6c:02:1e:0f:a4:22:8d:9a:07:4a:98:9f:50:05:b4:69] modulus: ab1eff1f95130995bc0772fe16b8d130f99ac84e2f4cb7c5b4da0b65c341f39802b207b0af76443e5b038d1af93ca3a30ff969a7f4ce34dcef791ddd14b5ed2b47a3409fd2c416d5bd96e0fa4e1ce411c5ef0dc9688429107fe98805c45fe1a6e769b2482fd35bd89a9d3f46c8c1e3878a4ff66043a84d87cb392cd27a95fde7b56b0fa1abf3351db1e5af986963934de2c760cacd679174ed16f316fa4b2ff142b66f01f43eab9e59a02cb0bfd37b0de41710d7ccad2d8028febb36c377eb92d7b0e74b23939fedf3d2706fa07b3b8c52a994595e6989869ec3816d6538b1828a0d810168fbef68f5d1ca68cab4000a754549f073f6d14a9c76791be81fd815 public exponent: 10001 ] 2021-09-12 08:41:23.719 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:41:23.721 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:41:23.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:41:23.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:41:23.726 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:41:23.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:41:23.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:41:23.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:41:23.728 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:41:23.729 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:41:23.736 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:41:23.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:41:23.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:41:23.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:41:23.910 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:41:23.911 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:41:23.911 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:41:23.912 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:41:23.915 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:41:23.916 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:41:23.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:41:23.919 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:41:23.919 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:41:23.921 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:41:23.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:41:23.922 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:41:23.923 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:41:23.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:41:23.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:41:23.926 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:41:23.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:c0:ed:8b:3c:fe:d8:f0:22:4c:f4:b0:8b:19:fd:8d:bf:39:62:a6] modulus: b685a4ab0ab5b118ed60213db5d21d2034e16dbc3f201c8f82e465b36b4394b5f5284167bee8d7584dd43315113eef5cd11dc9c4c9f876911d0530f6978e86ed0f1d2d192504f11289b50ee1edb775a9c1abf02188b103901ad3693a6e5f250df1ad7ffaa81daa4d4bb8dcd0bda93443841a3d0e432324e244c3183bc48c56f1375fba13967e5feecd1b1e62e652bc4544d061f1a9f6848830c08489f3108e958d04aa5bbd6bd192b36ee857aecc1c39f92bd5db4f5430ceb7a541cc30de7ec651495cc4cb91ac4558093e7d744dbd6c746e0204523260a5213176c9f8b50484b097e1a42f1d3172d7d349ae9279cbbcf7a0cf88ae5156583641cea549ec0607 public exponent: 10001 ] 2021-09-12 08:43:12.724 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:43:12.726 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:43:12.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-12 08:43:12.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:43:12.732 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-12 08:43:12.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:43:12.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:43:12.734 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:43:12.735 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:43:12.735 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:43:12.741 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:43:12.742 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:43:12.742 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:43:12.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:43:12.934 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:43:12.935 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:43:12.936 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:43:12.936 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:43:12.938 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:43:12.939 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:43:12.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:43:12.940 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:43:12.941 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:43:12.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:43:12.942 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:43:12.943 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:43:12.944 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:43:12.945 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:43:12.945 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:43:12.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:43:12.951 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:3c:ed:bb:9d:92:75:55:9e:8e:a4:cb:2d:aa:c5:bd:f6:1c:5d:a8] modulus: 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 public exponent: 10001 ] 2021-09-12 08:45:14.413 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:45:14.417 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:45:14.420 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-12 08:45:14.421 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:45:14.421 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-12 08:45:14.422 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:45:14.423 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:45:14.423 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:45:14.424 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:45:14.424 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:45:14.433 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:45:14.434 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:14.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:14.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:14.635 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:45:14.636 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:45:14.637 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:45:14.637 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:14.639 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:45:14.640 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:45:14.641 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:14.641 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:14.642 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:14.643 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:14.644 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:14.644 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:14.645 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:14.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:14.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:14.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:45:14.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:13:50:1b:41:56:16:7e:95:19:c7:50:82:69:30:2c:e1:ab:27:ec] modulus: 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 public exponent: 10001 ] 2021-09-12 08:45:23.481 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:45:23.483 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:45:23.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-12 08:45:23.485 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:45:23.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-12 08:45:23.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:45:23.487 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:45:23.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:45:23.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:45:23.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:45:23.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:45:23.494 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:23.495 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:23.495 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:23.641 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:45:23.642 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:45:23.643 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:45:23.643 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:23.645 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:45:23.646 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:45:23.646 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:23.647 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:23.647 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:23.648 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:23.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:23.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:23.651 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:23.651 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:23.652 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:23.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:45:23.658 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:62:71:aa:dc:47:95:65:d8:c8:d3:10:5f:3f:a0:f3:65:74:75:41] modulus: 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 public exponent: 10001 ] 2021-09-12 08:45:47.844 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:45:47.846 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:45:47.847 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-12 08:45:47.848 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:45:47.848 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-12 08:45:47.849 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:45:47.850 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:45:47.850 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:45:47.850 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:45:47.851 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:45:47.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:45:47.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:47.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:45:47.858 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:47.992 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:45:47.992 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:45:47.993 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:45:47.993 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:45:47.994 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:45:47.994 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:45:47.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:47.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:47.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:47.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:47.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:47.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:47.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:45:47.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:45:47.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:45:48.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:45:48.004 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: c2790c470fe2dc99d493cbeabe4815b0c37f0d1afa4a7bb061d38872eb81a84d5a1bedb349152cb5ee41d5a05dabcaa11bc0ee98a09c526aa1002397371fd4420c4b1f62ba1d465e5e3e7252730a8d37966c83523fbbb573ca62e3ab02b6db5005f085aef81821f3f86d8c38b29d63b3f350bd84014a5ab93394de01f06b689915e7a6b16458a1626fbfdbc6682fe96e4fecdd28bb92be598767fa1a562c296b9005ef5aaf0fe61c9540513d4426f0a0669524217e488357e5667c151fff475e23831c5ecb17ee1545daa6bf8f2140e10bef6346220366024d5a46df23a91051788b71e6db6eeb7e987062ffe0d1d677cb003da9f8aa340d31f2ba253d11b7f065db6c7a6e11aaf87ac51c82c4299a44ba651fb72d40dbaa60f9168c49f647bdb9d085ee018dcaf65253475886f521e82538168940a220a8178f8977c2151aca2c26b2b06e959583428a98bfe282ecbd51f39ed0159ca329bd3827a5e45ad7ca9dc4271be6fb909d340e25088b1bafa9dcd21bcb11bb1908e6c9e4efc530308d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:76:41:82:8c:2d:1a:e8:63:71:f1:87:d1:14:23:26:a1:ba:d2:bb] modulus: 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 public exponent: 10001 ] 2021-09-12 08:46:21.081 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:46:21.083 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:46:21.086 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-12 08:46:21.101 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:46:21.102 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-12 08:46:21.103 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:46:21.104 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:46:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:46:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:46:21.107 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:46:21.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:46:21.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:46:21.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:46:21.118 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:46:21.297 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:46:21.298 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:46:21.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:46:21.299 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:46:21.302 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:46:21.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:46:21.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:46:21.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:46:21.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:46:21.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:46:21.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:46:21.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:46:21.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:46:21.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:46:21.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:46:21.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:46:21.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:b8:e9:47:2d:5c:24:e7:50:57:34:ca:a8:ca:c9:80:f7:36:a2:cf] modulus: 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 public exponent: 10001 ] 2021-09-12 08:47:56.714 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:47:56.717 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:47:56.719 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:47:56.720 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:47:56.721 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:47:56.721 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:47:56.722 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:47:56.722 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:47:56.723 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:47:56.723 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:47:56.728 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:47:56.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:47:56.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:47:56.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:47:56.874 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:47:56.874 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:47:56.875 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:47:56.875 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:47:56.876 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:47:56.877 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:47:56.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:47:56.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:47:56.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:47:56.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:47:56.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:47:56.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:47:56.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:47:56.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:47:56.881 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:47:56.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:47:56.885 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: c2790c470fe2dc99d493cbeabe4815b0c37f0d1afa4a7bb061d38872eb81a84d5a1bedb349152cb5ee41d5a05dabcaa11bc0ee98a09c526aa1002397371fd4420c4b1f62ba1d465e5e3e7252730a8d37966c83523fbbb573ca62e3ab02b6db5005f085aef81821f3f86d8c38b29d63b3f350bd84014a5ab93394de01f06b689915e7a6b16458a1626fbfdbc6682fe96e4fecdd28bb92be598767fa1a562c296b9005ef5aaf0fe61c9540513d4426f0a0669524217e488357e5667c151fff475e23831c5ecb17ee1545daa6bf8f2140e10bef6346220366024d5a46df23a91051788b71e6db6eeb7e987062ffe0d1d677cb003da9f8aa340d31f2ba253d11b7f065db6c7a6e11aaf87ac51c82c4299a44ba651fb72d40dbaa60f9168c49f647bdb9d085ee018dcaf65253475886f521e82538168940a220a8178f8977c2151aca2c26b2b06e959583428a98bfe282ecbd51f39ed0159ca329bd3827a5e45ad7ca9dc4271be6fb909d340e25088b1bafa9dcd21bcb11bb1908e6c9e4efc530308d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:69:17:b2:4a:0b:06:3b:49:a0:31:9a:d5:80:59:78:d8:45:fb:c1] modulus: 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 public exponent: 10001 ] 2021-09-12 08:48:04.115 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:48:04.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:48:04.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-12 08:48:04.122 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:48:04.123 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-12 08:48:04.124 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:48:04.124 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:48:04.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:48:04.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:48:04.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:48:04.133 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:48:04.133 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:48:04.134 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:48:04.134 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:48:04.263 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:48:04.264 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:48:04.265 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:48:04.265 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:48:04.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:48:04.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:48:04.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:04.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:04.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:04.268 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:04.268 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:04.268 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:04.269 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:04.269 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:04.269 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:04.270 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:48:04.273 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:28:d7:21:c9:dd:72:15:49:56:42:c0:b3:49:58:fa:7d:94:ca:92] modulus: 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 public exponent: 10001 ] 2021-09-12 08:48:06.109 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-12 08:48:06.110 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-12 08:48:06.112 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:48:06.114 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-12 08:48:06.114 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-12 08:48:06.114 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-12 08:48:06.115 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-12 08:48:06.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-12 08:48:06.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-12 08:48:06.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-12 08:48:06.125 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-12 08:48:06.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:48:06.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-12 08:48:06.128 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:48:06.225 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-12 08:48:06.226 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-12 08:48:06.226 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-12 08:48:06.226 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-12 08:48:06.227 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-12 08:48:06.228 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-12 08:48:06.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:06.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:06.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:06.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:06.229 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:06.230 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:06.230 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-12 08:48:06.230 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-12 08:48:06.231 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-12 08:48:06.231 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-12 08:48:06.234 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 191505462226660276055456752379048606704436653952 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 12 06:02:28 UTC 2021 Final Date: Fri Sep 12 06:02:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:d7:8e:1b:52:f1:6b:c1:0c:06:c7:b2:6d:d4:3c:4f:98:5c:ca:00] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6fd8a496efe90d673edc24829c0265fdffc8dd68 3c80669d70bd2dda85ce4515fedb9fef5fa1ceae 794d54f2e614d24699b856e22f0270520060bd6d f135f8e32b495c62e6d7f656fd1aea196833d506 8aa57d3aa66ff280aaf41c75ceb1c6082cd6399f a6cbb4000e5341a156c8ea790d12979e10389dd4 673ebf513e7065f0fe0d11fedec875a529ea90e1 e43cbef43bb2b63c50031d2003a35ccd1e73f749 8104dd582c13c057969c9e558549f82affe4fb27 f3a55776bce777767c509709fd0f47c6cfe35a20 a578c74fcac2e49df0331f8c67006a28b57ba7aa f1a9018b20dbc47a0b0a0e13722371ed6a37e913 59c1a88ed9ad29e178fddf2dd5e39a74dfb9e99f 6da93e946c5bc89139c284ba72782f9dc3c881df d88c48adeb37901f3ada9e5d0db42a93aef79b7f 147889e015924bcdb303efb7bc7bdbc437114e6d 98713283116cc4ccc7cac88ab3e6d5b49692fcad b59b57775a854773a2a02b5c30d8d8d9415aafc5 37264fd93721c11b534461ebd85c782ee6e4f6ae 7c46cc34 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:42:b0:1f:6a:0a:dc:7d:01:4a:bc:49:37:b2:be:d7:4f:49:c5:f8] modulus: dbbf73af5175ee8e9398685058e1550e13af70e467c92ec2c87fb175d08c68590f3218b971f45dbef9bf13032271629a3c0c4142db88d216f3f93aeaf8496400cb88829962950469381b14b944e6e0fa3088bf10bb61ba62b1671584f35b2140da4b3107955537d96b3acc5227950442fc00de4b40e3770be5ed01572c6082cd2fd52553983bcee55363faf7ac24da97b7edeb31b3ff2a6dc60c6a6ba75ec8a3cc38ae375b13a532acaa6a24eac242df9c6dd762f3caeccf007df50399784008f4c0787064271559b4a7b9377ece85a46eb850e1f338dcaa8d83b4cd95889415183f3bbfaf71073cb7631c432812ee637cd0df5caa503657e56e9ff38621c159 public exponent: 10001 ]