By type
2021-09-14 06:12:32,706 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-14 06:12:33,470 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-14 06:12:34.194 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-09-14 06:12:36.941 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-14 06:12:37.195 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-09-14 06:12:37.367 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-14 06:12:39.498 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.412 seconds (JVM running for 9.198) 2021-09-14 06:20:32.140 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 06:20:32.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 06:20:32.203 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-14 06:20:32.209 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 06:20:32.246 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-14 06:20:32.250 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 06:20:32.251 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 06:20:32.253 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 06:20:32.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 06:20:32.258 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 06:20:32.266 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 06:20:32.270 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 06:20:32.308 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 06:20:32.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 06:20:32.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 06:20:32.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 06:20:32.978 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 06:20:32.982 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 06:20:32.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 06:20:32.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 06:20:32.996 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 06:20:32.997 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 06:20:32.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 06:20:32.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 06:20:33.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 06:20:33.015 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 06:20:33.016 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 06:20:33.016 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 06:20:33.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 06:20:33.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 06:20:33.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 06:20:33.026 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 06:20:33.057 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:1a:53:33:f2:6c:42:20:17:a9:ec:88:3b:d6:c4:fc:c3:f5:db:22] modulus: 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 public exponent: 10001 ] 2021-09-14 09:02:40.950 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:02:40.953 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:02:40.956 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-14 09:02:40.958 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:02:40.959 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-14 09:02:40.959 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:02:40.960 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:02:40.961 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:02:40.962 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:02:40.962 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:02:40.976 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:02:40.977 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:02:40.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:02:40.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:02:41.261 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:02:41.263 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:02:41.264 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:02:41.265 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:02:41.270 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:02:41.271 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:02:41.272 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:02:41.273 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:02:41.274 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:02:41.276 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:02:41.277 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:02:41.278 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:02:41.280 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:02:41.280 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:02:41.281 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:02:41.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:02:41.288 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:46:9e:37:56:9d:23:04:bc:d5:44:c4:c9:0a:d0:46:fc:01:d4:81] modulus: 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 public exponent: 10001 ] 2021-09-14 09:06:10.429 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:06:10.431 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:06:10.433 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-14 09:06:10.434 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:06:10.435 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-14 09:06:10.436 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:06:10.436 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:06:10.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:06:10.437 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:06:10.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:06:10.446 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:06:10.447 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:06:10.447 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:06:10.448 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:06:10.668 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:06:10.669 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:06:10.669 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:06:10.670 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:06:10.676 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:06:10.677 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:06:10.678 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:06:10.678 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:06:10.679 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:06:10.680 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:06:10.680 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:06:10.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:06:10.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:06:10.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:06:10.683 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:06:10.684 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:06:10.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: ada87e54e51b316c812df373fce01bf1714e77a8116a3adfd7e51e180ec775f5d25efd8bc981c7838dabd67f5fe2b7bd901ac405fb719e7fb441f15268b6aef6dda76565b7427be68521179d79640c0ce1f953f9d67a1cc143a3772995a659b55ab52876b6c19c0757d07b80c188818955f06d050a663756f5e15f70083f8675d11461dfe421d79670a8753a83645ada3689cbbf24f1dd56d5c58249114eb0982b6b0684fcc9811709a172e1cf8fc4ca7eac5c9960657a62316ff6cebb1cb58fb968b38c7d302cc66daf341aa8e3bdaf1cd585d041b693e1bf1b90d6642ab0e67b26b50d75674a5396113e920bcac675719e9567172ef4501e81f036590732cef06af719bb85a8916f017e9cff66adfd14809e23b7cace4372324c948a28de413de9afe58864e6bcddd74104625a8bcb304d6a06ea70ca88c3ce93c65cd69921e4cabfad203966f3b39e961afbc9d9d32b310c52a6fb1523372a2fd4d54a10891cfcfc6c7f244c6b0cf6e7b8adb223a8e4ef40ce7d7ea5e2ae57fce23f2afc2f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:d1:1e:b5:59:6f:fc:43:e3:9f:e2:17:e4:c5:42:46:28:89:7f:a9] modulus: b9dd4f48b6e203af358c056ab957b5fe707b40d017d90a0ca500df8a27ae816ebd61dcee838d8a400edbce2e80c1684f1c06a2dece25c2740c2add81fd8623c9a4c55d230d62e92ffe7ceb71f9fb96649874e10c45b35e561e7276679d509c6fa160fb2920b9fe0f33d9e55f16e89a1beb5a68c296168441d7a2f5d253810d094195ad033488767e02ba26b7edfd3a02e04001143f59fec95b3e4e70f9fe97ee0037c05c7dbf2d316156e7c6d5dbfafe87881415556c91728bcb1a06aa08ceebbf0474ff346e4c62b311e1328eec473ba5d002de088f3bef6fdea5e8b732adf2c2c822584bbe72a097518e64d8321551fa645e60f4e041ab0350bce64756533d public exponent: 10001 ] 2021-09-14 09:07:37.314 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:07:37.321 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:07:37.325 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:07:37.326 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:07:37.327 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:07:37.327 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:07:37.328 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:07:37.328 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:07:37.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:07:37.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:07:37.335 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:07:37.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:07:37.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:07:37.336 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:07:37.550 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:07:37.551 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:07:37.552 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:07:37.552 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:07:37.554 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:07:37.554 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:07:37.555 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:07:37.555 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:07:37.556 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:07:37.556 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:07:37.557 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:07:37.557 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:07:37.558 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:07:37.558 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:07:37.558 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:07:37.559 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:07:37.566 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: ada87e54e51b316c812df373fce01bf1714e77a8116a3adfd7e51e180ec775f5d25efd8bc981c7838dabd67f5fe2b7bd901ac405fb719e7fb441f15268b6aef6dda76565b7427be68521179d79640c0ce1f953f9d67a1cc143a3772995a659b55ab52876b6c19c0757d07b80c188818955f06d050a663756f5e15f70083f8675d11461dfe421d79670a8753a83645ada3689cbbf24f1dd56d5c58249114eb0982b6b0684fcc9811709a172e1cf8fc4ca7eac5c9960657a62316ff6cebb1cb58fb968b38c7d302cc66daf341aa8e3bdaf1cd585d041b693e1bf1b90d6642ab0e67b26b50d75674a5396113e920bcac675719e9567172ef4501e81f036590732cef06af719bb85a8916f017e9cff66adfd14809e23b7cace4372324c948a28de413de9afe58864e6bcddd74104625a8bcb304d6a06ea70ca88c3ce93c65cd69921e4cabfad203966f3b39e961afbc9d9d32b310c52a6fb1523372a2fd4d54a10891cfcfc6c7f244c6b0cf6e7b8adb223a8e4ef40ce7d7ea5e2ae57fce23f2afc2f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:c7:76:ce:09:89:55:6c:ee:52:98:aa:0d:d2:14:35:0b:cb:8b:a1] modulus: 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 public exponent: 10001 ] 2021-09-14 09:08:06.805 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:08:06.809 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:08:06.811 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-14 09:08:06.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:08:06.813 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-14 09:08:06.814 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:08:06.814 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:08:06.815 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:08:06.815 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:08:06.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:08:06.821 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:08:06.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:06.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:06.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:06.977 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:08:06.978 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:08:06.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:08:06.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:06.980 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:08:06.981 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:08:06.981 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:06.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:06.982 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:06.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:06.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:06.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:06.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:06.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:06.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:06.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:08:06.990 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:6b:4d:e6:bc:3b:8f:85:46:22:a6:95:e7:3e:39:ca:c7:ea:16:85] modulus: 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 public exponent: 10001 ] 2021-09-14 09:08:17.501 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:08:17.502 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:08:17.504 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:08:17.505 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:08:17.505 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:08:17.506 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:08:17.506 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:08:17.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:08:17.507 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:08:17.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:08:17.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:08:17.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:17.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:17.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:17.703 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:08:17.704 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:08:17.704 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:08:17.704 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:17.706 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:08:17.706 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:08:17.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:17.707 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:17.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:17.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:17.709 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:17.709 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:17.710 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:17.710 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:17.710 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:17.712 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:08:17.716 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:17:6d:bd:e8:f9:ee:ec:7c:b9:06:78:f8:59:ac:f6:e7:26:94:7d] modulus: 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 public exponent: 10001 ] 2021-09-14 09:08:46.377 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:08:46.378 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:08:46.380 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-14 09:08:46.381 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:08:46.381 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-14 09:08:46.382 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:08:46.383 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:08:46.383 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:08:46.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:08:46.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:08:46.393 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:08:46.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:46.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:08:46.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:46.629 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:08:46.630 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:08:46.630 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:08:46.631 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:08:46.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:08:46.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:08:46.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:46.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:46.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:46.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:46.635 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:46.635 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:46.636 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:08:46.636 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:08:46.636 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:08:46.637 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:08:46.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:f4:1e:62:a7:9b:22:ba:37:1f:97:c7:ac:ac:93:51:5c:45:0f:86] modulus: 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 public exponent: 10001 ] 2021-09-14 09:10:31.524 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:10:31.526 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:10:31.530 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-14 09:10:31.531 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:10:31.531 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-14 09:10:31.533 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:10:31.538 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:10:31.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:10:31.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:10:31.540 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:10:31.545 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:10:31.546 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:10:31.546 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:10:31.547 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:10:31.775 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:10:31.776 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:10:31.776 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:10:31.777 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:10:31.778 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:10:31.779 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:10:31.779 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:31.779 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:31.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:31.780 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:31.783 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:31.784 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:31.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:31.786 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:31.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:31.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:10:31.804 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:c8:4a:f7:e7:02:6c:55:15:39:a5:a3:64:92:b8:45:20:c2:ea:99] modulus: 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 public exponent: 10001 ] 2021-09-14 09:10:48.676 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:10:48.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:10:48.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-14 09:10:48.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:10:48.682 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-14 09:10:48.683 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:10:48.684 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:10:48.684 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:10:48.684 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:10:48.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:10:48.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:10:48.697 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:10:48.698 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:10:48.698 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:10:48.933 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:10:48.934 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:10:48.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:10:48.934 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:10:48.936 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:10:48.936 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:10:48.936 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:48.937 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:48.937 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:48.938 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:48.939 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:10:48.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:10:48.940 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:10:48.941 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:10:48.945 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: ada87e54e51b316c812df373fce01bf1714e77a8116a3adfd7e51e180ec775f5d25efd8bc981c7838dabd67f5fe2b7bd901ac405fb719e7fb441f15268b6aef6dda76565b7427be68521179d79640c0ce1f953f9d67a1cc143a3772995a659b55ab52876b6c19c0757d07b80c188818955f06d050a663756f5e15f70083f8675d11461dfe421d79670a8753a83645ada3689cbbf24f1dd56d5c58249114eb0982b6b0684fcc9811709a172e1cf8fc4ca7eac5c9960657a62316ff6cebb1cb58fb968b38c7d302cc66daf341aa8e3bdaf1cd585d041b693e1bf1b90d6642ab0e67b26b50d75674a5396113e920bcac675719e9567172ef4501e81f036590732cef06af719bb85a8916f017e9cff66adfd14809e23b7cace4372324c948a28de413de9afe58864e6bcddd74104625a8bcb304d6a06ea70ca88c3ce93c65cd69921e4cabfad203966f3b39e961afbc9d9d32b310c52a6fb1523372a2fd4d54a10891cfcfc6c7f244c6b0cf6e7b8adb223a8e4ef40ce7d7ea5e2ae57fce23f2afc2f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:b9:d1:42:d0:3d:ea:19:66:2f:2b:98:a4:39:c2:c5:e7:0c:43:94] modulus: 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 public exponent: 10001 ] 2021-09-14 09:12:32.099 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:12:32.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:12:32.104 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:12:32.104 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:12:32.105 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-14 09:12:32.106 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:12:32.106 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:12:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:12:32.107 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:12:32.108 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:12:32.115 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:12:32.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:12:32.116 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:12:32.117 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:12:32.305 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:12:32.306 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:12:32.307 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:12:32.307 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:12:32.309 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:12:32.310 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:12:32.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:32.311 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:32.311 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:32.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:32.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:32.312 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:32.313 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:32.313 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:32.313 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:32.314 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:12:32.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:45:d5:b5:c8:dc:05:2d:65:d9:2f:d9:3c:5b:8f:9a:9c:fd:9d:69] modulus: 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 public exponent: 10001 ] 2021-09-14 09:12:44.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-14 09:12:44.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-14 09:12:44.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-14 09:12:44.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-14 09:12:44.272 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-14 09:12:44.273 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-14 09:12:44.273 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-14 09:12:44.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-14 09:12:44.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-14 09:12:44.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-14 09:12:44.279 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-14 09:12:44.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:12:44.280 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-14 09:12:44.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:12:44.502 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-14 09:12:44.503 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-14 09:12:44.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-14 09:12:44.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-14 09:12:44.507 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-14 09:12:44.508 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-14 09:12:44.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:44.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:44.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:44.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:44.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:44.512 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:44.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-14 09:12:44.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-14 09:12:44.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-14 09:12:44.516 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-14 09:12:44.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108952262023508969118410707052773539334796702783 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 14 06:10:05 UTC 2021 Final Date: Sun Sep 14 06:10:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae 38bd930a2ed18385017a3b480013240d6b9822c0 16476f2540ccf3259cc2bd74dc08780720e339b0 dde3e6f1c72148c4ead0076191974c9ebc1c9d97 4a3f351720bc4b63d38505f41833a787daaa856f 720bc541e28102ae45969f6a786ed81c10d39276 995faa3c1d04f2de42609791d3b7f812b063c3bd 3215bd74d989be3dbf1b5768c45bc603b813be81 659b9e3ae9e995afed54d027487e604f74935336 5ea2c4cf593971535a84a61903c070d669f584d2 d3db7bd8228a751ad6d923435559c51fa4ba1c60 037ba2083ce7d15ea98e0742676f671721f865b0 19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2 26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f 49c897bbe53fa6241a1814d87c427f8c5e4338c5 eb8bd523278641051a1023853bac35c158b52a47 2bc1d01b58ee475caa5b089a5b08130d8d61565e 07c708be2698071406a36e023e67eaacf750aff3 9e526e2274008a1ea9573f00def8651536a3af16 c9744fcb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:8f:e2:05:6a:67:58:a3:e1:0c:e8:d0:6c:46:cf:ed:64:a8:64:12] modulus: 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 public exponent: 10001 ]