By type
2021-10-06 13:33:28,006 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-06 13:33:28,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-06 13:33:29.657 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-06 13:33:32.738 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-06 13:33:33.021 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-06 13:33:33.181 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-06 13:33:35.398 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.997 seconds (JVM running for 9.743) 2021-10-06 13:46:27.250 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 13:46:27.290 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 13:46:27.340 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-06 13:46:27.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 13:46:27.368 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-06 13:46:27.372 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 13:46:27.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 13:46:27.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 13:46:27.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 13:46:27.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 13:46:27.392 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 13:46:27.395 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 13:46:27.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 13:46:27.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 13:46:27.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 13:46:27.446 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 13:46:28.119 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 13:46:28.123 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 13:46:28.123 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 13:46:28.129 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 13:46:28.146 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 13:46:28.148 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 13:46:28.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 13:46:28.150 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 13:46:28.150 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 13:46:28.180 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 13:46:28.181 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 13:46:28.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 13:46:28.190 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 13:46:28.194 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 13:46:28.195 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 13:46:28.198 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 13:46:28.236 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 8cd65c1b518f0ddb504d3794cb5a47c4be68aa81eefe95cebbf86de4826058c3b0083e9c7c6dc60240c12f0b8af0894b6d8a327ef83d9adb836637716b9a66c7ea6c6899cc21b83ef1269906ce8428fb31a2abd909b426de0f18e33dc7875f1893f22fb29832d94ad598a3ef74e72d70f25f4a1f3e627ca96d4462b903397ae4268efe12cb3ca5f5b6e646e767dd5cb0409e9848e5245284994f793a1ec4fda565d49ce6286eb907ebd5ff37a7a83d1580087760e9dee2a89c68718f3885ca549b944a0d5148801907c26e02226d3fdc12addc28e93ae147701de1770f7a8ed1e1fa0e5f59d5ecf4c20a9c11ec0baa1dfa9948216c282477f19551a4ffbbdb4a13dfbda66808e08525155eabc6f0263ef3f0d023ef89679dc653f1231ca13c3fdacb488aa0d9b9735f80cbf75f4c5a5c5275e0bbc055ff477ee169ed37527896ac7cf70f6c54f5b9e80a15ae58781837238155ec5c7b17b79407f2b0f2a574819468aa6c3cb537b21063542230cfbe3d1fead2da8e1e494710bc20d7d6c7c409 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:05:e2:92:f1:b6:cf:c9:09:99:a7:7a:87:2f:a9:05:cc:af:93:36] modulus: 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 public exponent: 10001 ] 2021-10-06 16:21:30.652 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:21:30.658 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:21:30.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:21:30.691 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:21:30.693 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:21:30.696 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:21:30.698 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:21:30.701 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:21:30.707 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:21:30.712 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:21:30.723 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:21:30.725 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:21:30.726 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:21:30.727 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:21:30.919 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:21:30.920 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:21:30.921 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:21:30.922 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:21:30.927 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:21:30.928 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:21:30.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:21:30.929 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:21:30.930 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:21:30.932 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:21:30.932 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:21:30.933 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:21:30.934 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:21:30.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:21:30.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:21:30.937 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:21:30.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 8cd65c1b518f0ddb504d3794cb5a47c4be68aa81eefe95cebbf86de4826058c3b0083e9c7c6dc60240c12f0b8af0894b6d8a327ef83d9adb836637716b9a66c7ea6c6899cc21b83ef1269906ce8428fb31a2abd909b426de0f18e33dc7875f1893f22fb29832d94ad598a3ef74e72d70f25f4a1f3e627ca96d4462b903397ae4268efe12cb3ca5f5b6e646e767dd5cb0409e9848e5245284994f793a1ec4fda565d49ce6286eb907ebd5ff37a7a83d1580087760e9dee2a89c68718f3885ca549b944a0d5148801907c26e02226d3fdc12addc28e93ae147701de1770f7a8ed1e1fa0e5f59d5ecf4c20a9c11ec0baa1dfa9948216c282477f19551a4ffbbdb4a13dfbda66808e08525155eabc6f0263ef3f0d023ef89679dc653f1231ca13c3fdacb488aa0d9b9735f80cbf75f4c5a5c5275e0bbc055ff477ee169ed37527896ac7cf70f6c54f5b9e80a15ae58781837238155ec5c7b17b79407f2b0f2a574819468aa6c3cb537b21063542230cfbe3d1fead2da8e1e494710bc20d7d6c7c409 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:6b:1c:85:10:ef:39:44:f6:d1:ce:b9:a2:4e:d3:db:59:80:4d:64] modulus: 9bc25341c3e8dd4a20fa5a08dea5a3786c4c695640678b4300889b37bd47228758b4e96ab1ee68ce200985ba7bdec9972ab257aa6379cf1a61bdcfe1c4988ad0f81382ed97bbfac17b248f8c0b709af32169092f4c37ad966849f8328fbc1a7859eb29a14be0e15e1c01032a3204ef5676a2241ca2b7ad18d29cbde1b515423da5ea1440126315be6435b8f628a32a7fd67cb9c5cf8d3dc2f8d3d532889dbf33ac5855ba246b0074cd21f825105cd9d85520ed2bffb919a2db61f4318975b5b589a64800c88e874d6c081a7175cf3506b808874e0304264c2d59c35e0ba032ed629b2f961c3c88093fe25e451f86c69db5cb42d6614a0d4226b25b4962b53a0d public exponent: 10001 ] 2021-10-06 16:28:44.736 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:28:44.739 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:28:44.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:28:44.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:28:44.745 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:28:44.749 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:28:44.755 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:28:44.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:28:44.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:28:44.774 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:28:44.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:28:44.791 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:28:44.792 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:28:44.792 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:28:44.945 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:28:44.946 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:28:44.946 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:28:44.947 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:28:44.952 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:28:44.953 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:28:44.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:28:44.954 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:28:44.955 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:28:44.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:28:44.956 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:28:44.957 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:28:44.959 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:28:44.963 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:28:44.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:28:44.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:28:44.978 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 8cd65c1b518f0ddb504d3794cb5a47c4be68aa81eefe95cebbf86de4826058c3b0083e9c7c6dc60240c12f0b8af0894b6d8a327ef83d9adb836637716b9a66c7ea6c6899cc21b83ef1269906ce8428fb31a2abd909b426de0f18e33dc7875f1893f22fb29832d94ad598a3ef74e72d70f25f4a1f3e627ca96d4462b903397ae4268efe12cb3ca5f5b6e646e767dd5cb0409e9848e5245284994f793a1ec4fda565d49ce6286eb907ebd5ff37a7a83d1580087760e9dee2a89c68718f3885ca549b944a0d5148801907c26e02226d3fdc12addc28e93ae147701de1770f7a8ed1e1fa0e5f59d5ecf4c20a9c11ec0baa1dfa9948216c282477f19551a4ffbbdb4a13dfbda66808e08525155eabc6f0263ef3f0d023ef89679dc653f1231ca13c3fdacb488aa0d9b9735f80cbf75f4c5a5c5275e0bbc055ff477ee169ed37527896ac7cf70f6c54f5b9e80a15ae58781837238155ec5c7b17b79407f2b0f2a574819468aa6c3cb537b21063542230cfbe3d1fead2da8e1e494710bc20d7d6c7c409 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:9f:0c:dd:0f:15:e1:48:17:64:b5:f5:f1:c0:3e:93:dc:1c:99:6b] modulus: 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 public exponent: 10001 ] 2021-10-06 16:31:02.407 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:31:02.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:31:02.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:31:02.429 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:31:02.430 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:31:02.432 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:31:02.433 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:31:02.433 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:31:02.434 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:31:02.435 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:31:02.444 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:31:02.446 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:31:02.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:31:02.448 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:31:02.609 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:31:02.610 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:31:02.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:31:02.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:31:02.614 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:31:02.614 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:31:02.615 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:31:02.615 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:31:02.615 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:31:02.616 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:31:02.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:31:02.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:31:02.618 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:31:02.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:31:02.626 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:31:02.627 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:31:02.635 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:d8:a8:8e:b0:3a:7a:0b:77:5e:a0:66:1a:d8:82:b0:9a:b6:8e:e8] modulus: c2ba671c54e58f7778513795b7ca3c115d14ffb7f2923a8a019779e6869110f6f0bf7f26a50585e80e4960d3ae320fb46333ba32afab857a348a86e3ecee06c7a40093917a14342f4186eb80a5d7864b2607d3cb35ade7b3fe3289cdaa8254b4e8e26502c27f9d989d02ea5c7998aa3655e689730fbee9cec34c6a394a7b206bc21a150843649781d476367d7f77dca8ca238a12ea0bdd9373c50849cb524709db67b9c32a9f77dcb788f11bea572e1cce20569686ef92723eb512a17e67ab4e2a98c2c33b3b70d121a860143bad292ac83df12b8340c21eb9fe4a6484d799047511ba402eb21930284d3f8032e7ae17b7e137e4353000433f21487b79d18e45 public exponent: 10001 ] 2021-10-06 16:32:00.308 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:32:00.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:32:00.314 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:32:00.315 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:32:00.316 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:32:00.318 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:32:00.320 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:32:00.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:32:00.321 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:32:00.321 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:32:00.328 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:32:00.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:32:00.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:32:00.330 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:32:00.483 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:32:00.484 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:32:00.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:32:00.485 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:32:00.488 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:32:00.488 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:32:00.489 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:32:00.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:32:00.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:32:00.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:32:00.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:32:00.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:32:00.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:32:00.494 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:32:00.495 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:32:00.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:32:00.501 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:c5:d1:8e:33:89:cf:05:23:f8:c3:3d:22:b9:5c:d9:80:e5:aa:d6] modulus: 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 public exponent: 10001 ] 2021-10-06 16:35:23.475 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:35:23.478 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:35:23.482 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:35:23.483 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:35:23.484 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:35:23.485 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:35:23.486 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:35:23.487 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:35:23.488 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:35:23.488 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:35:23.495 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:35:23.496 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:35:23.496 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:35:23.497 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:35:23.645 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:35:23.646 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:35:23.647 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:35:23.648 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:35:23.649 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:35:23.650 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:35:23.656 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:23.657 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:23.658 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:23.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:23.661 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:23.662 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:23.665 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:23.665 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:23.666 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:23.667 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:35:23.685 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:c8:51:0c:3c:51:a5:72:0b:dc:b2:05:7e:bf:ab:ae:27:14:5d:9d] modulus: c5e663315384fd80b5d70f5107c77adc67c0d15078af4e263310bcb9617ff15e17eecfa8638854e556b5f9f9d5d445645dcfdf9c0245a6d7f7df215a875199991fad4d3b6247d072e620e1c15525863efc31f9caf8b3a042ea98f4f84462518e50daed498abe7c69ddb911920baca5c9573f9316b0c70c166448d0c5210e0685eac4f3bd27f9216a43bb17be6eb792d6e1a1569fd15123f524f62d323a2f77d9c9d27cbceb32e7b3f5ab9f38ecad7940142ef4288f88328314e7a1d0d326511a419607b36e21f8f421d103b8123a1c42f2fb44a99a9e0d0a38a2f2519b8db0f632bebb674a2ecaf4b089fa639d375a70560b926b5afa14af5380740ab2985a27 public exponent: 10001 ] 2021-10-06 16:35:56.748 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:35:56.749 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:35:56.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-06 16:35:56.753 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:35:56.753 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-06 16:35:56.754 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:35:56.755 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:35:56.755 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:35:56.756 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:35:56.757 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:35:56.762 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:35:56.763 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:35:56.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:35:56.764 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:35:56.960 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:35:56.962 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:35:56.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:35:56.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:35:56.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:35:56.968 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:35:56.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:56.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:56.969 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:56.970 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:56.971 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:56.971 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:56.972 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:35:56.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:35:56.973 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:35:56.975 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:35:56.979 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:49:e7:0f:50:ad:50:e5:83:43:68:f3:6a:43:af:4b:6b:2f:b9:88] modulus: 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 public exponent: 10001 ] 2021-10-06 16:36:29.028 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:36:29.031 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:36:29.033 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-06 16:36:29.034 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:36:29.034 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-06 16:36:29.035 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:36:29.035 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:36:29.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:36:29.036 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:36:29.037 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:36:29.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:36:29.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:36:29.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:36:29.047 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:36:29.187 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:36:29.191 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:36:29.192 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:36:29.192 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:36:29.194 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:36:29.194 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:36:29.195 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:29.195 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:29.196 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:29.197 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:29.198 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:29.199 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:29.201 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:29.203 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:29.205 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:29.207 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:36:29.219 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:50:30:18:b9:44:8d:24:51:58:14:9f:11:28:45:93:92:6c:cf:e7] modulus: 9760b9c7e9cad1fcb4da41874fca1c53d2cd54d3047da2aa1ee5c36515bb67d06412bf757ab552f7894a2615fce72680d7cc2aa550fee9b4662fd4e06d965e9e2248d2151468dec2c6349080aeafd57a8e24646d81d284c2674ede96dbf6ca0dd71151da22a4e421b3f99fbcaca77e7ff89d87167b25559e79679c64591613b207b0f264a823c7d6abc965af92b4003dc045a0096337bf5802850825db26c13df032b669956ba04778e46c5c687ab4b01a2611d21faf5411fde75714a0cd283c1138ba230a7af63dda41dac9ec6684dc1512df8705cdeb457017d39a3ad93b6e57a498eacc68ff3c239723dbe29b78833b09e1e7209b344786c8763fa260c185 public exponent: 10001 ] 2021-10-06 16:36:36.272 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:36:36.273 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:36:36.275 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:36:36.275 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:36:36.280 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:36:36.281 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:36:36.281 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:36:36.282 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:36:36.282 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:36:36.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:36:36.287 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:36:36.290 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:36:36.290 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:36:36.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:36:36.392 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:36:36.394 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:36:36.394 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:36:36.395 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:36:36.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:36:36.397 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:36:36.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:36.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:36.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:36.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:36.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:36.400 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:36.401 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:36:36.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:36:36.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:36:36.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:36:36.408 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 8cd65c1b518f0ddb504d3794cb5a47c4be68aa81eefe95cebbf86de4826058c3b0083e9c7c6dc60240c12f0b8af0894b6d8a327ef83d9adb836637716b9a66c7ea6c6899cc21b83ef1269906ce8428fb31a2abd909b426de0f18e33dc7875f1893f22fb29832d94ad598a3ef74e72d70f25f4a1f3e627ca96d4462b903397ae4268efe12cb3ca5f5b6e646e767dd5cb0409e9848e5245284994f793a1ec4fda565d49ce6286eb907ebd5ff37a7a83d1580087760e9dee2a89c68718f3885ca549b944a0d5148801907c26e02226d3fdc12addc28e93ae147701de1770f7a8ed1e1fa0e5f59d5ecf4c20a9c11ec0baa1dfa9948216c282477f19551a4ffbbdb4a13dfbda66808e08525155eabc6f0263ef3f0d023ef89679dc653f1231ca13c3fdacb488aa0d9b9735f80cbf75f4c5a5c5275e0bbc055ff477ee169ed37527896ac7cf70f6c54f5b9e80a15ae58781837238155ec5c7b17b79407f2b0f2a574819468aa6c3cb537b21063542230cfbe3d1fead2da8e1e494710bc20d7d6c7c409 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:3a:d6:e5:ad:79:e7:4c:78:6c:32:d9:1b:90:df:f0:3a:15:e3:69] modulus: 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 public exponent: 10001 ] 2021-10-06 16:38:16.492 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:38:16.495 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:38:16.497 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:38:16.498 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:38:16.498 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:38:16.499 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:38:16.499 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:38:16.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:38:16.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:38:16.501 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:38:16.508 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:38:16.509 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:38:16.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:38:16.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:38:16.629 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:38:16.630 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:38:16.630 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:38:16.631 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:38:16.633 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:38:16.633 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:38:16.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:38:16.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:38:16.634 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:38:16.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:38:16.635 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:38:16.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:38:16.636 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:38:16.637 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:38:16.637 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:38:16.638 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:38:16.642 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:c5:7f:ad:db:fe:8c:00:2c:0d:a4:f9:53:d8:0a:44:2c:f8:5b:91] modulus: b64e058e06bee434c9ed0a6fd34e9be57f7b23bc200fa903d6558c6dd00cf64f3e8f7ba0659c7e31c17604ab195fe5f57b15de1a74c0ea1c1d6bad1e7b1ccd48264dd63501b40360f5e13ab3e616e8b577ea79a3e98d430c5a29dc70063680497f280431aff6ef14fbf3e19ea2d414bc448e0dca230881329ec0d81c22a4806cc8830a0b75e5594c47ed4a9c24ee770851031aa9c3401b4afcd85a3a2c5e56c3c7167ea95bb6f0a7e6aa0376b59d38af3122940132d88841b1d8333d0b2230856fbdd2608d1ded9c063b71e6426e19d11f5d6377bb820ec1d9ff0927799443ac160e7622698a7668d8fc0ba75da8770be3ad4448dc711e7db34f8a60b2ff52e3 public exponent: 10001 ] 2021-10-06 16:42:48.847 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:42:48.851 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:42:48.853 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:42:48.854 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:42:48.855 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:42:48.856 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:42:48.857 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:42:48.857 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:42:48.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:42:48.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:42:48.864 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:42:48.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:42:48.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:42:48.866 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:42:49.010 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:42:49.011 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:42:49.011 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:42:49.011 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:42:49.013 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:42:49.013 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:42:49.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:42:49.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:42:49.014 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:42:49.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:42:49.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:42:49.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:42:49.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:42:49.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:42:49.017 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:42:49.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:42:49.022 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:c1:4a:5a:d5:0a:cf:4a:44:4f:0f:cb:9b:bd:dc:f1:05:ce:c3:f0] modulus: baa91c549ad0139afcfc0124c12dbc9f9e8cc8a99605bec21eff0dcb98d729e055c70bb4bea765e503970d04cad47e71617340ddab9ba0c887f530f5f652bf8fd768fbe8c53de2d46241fb3282cdb7099a39e2707d3485a732be67ea9b026e810ceb8f31ada593b65ef6b929dfa05ecab66ae894608edbcb5273d74e721c691a4ae5aea826a3744fa986937b177c316cf50071acd189c08edd0aacc3588477fa545d4416bf1b452017a529f2f3e8e9ae817f3f2fc2e13aee7b00a6ecbd545f885be2af13cf9b5964dec80888055cb023b83e66d2d7bcdfcef06f477ca86f0a138aaa28fb5c3503a4d68642f851e0e1e48e8d42ead3ac2c91c7e3525dc6e3e67d public exponent: 10001 ] 2021-10-06 16:43:33.428 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:43:33.430 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:43:33.431 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:43:33.432 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:43:33.433 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:43:33.434 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:43:33.434 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:43:33.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:43:33.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:43:33.435 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:43:33.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:43:33.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:43:33.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:43:33.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:43:33.606 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:43:33.606 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:43:33.607 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:43:33.607 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:43:33.608 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:43:33.609 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:43:33.610 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:43:33.610 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:43:33.611 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:43:33.611 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:43:33.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:43:33.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:43:33.613 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:43:33.613 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:43:33.613 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:43:33.615 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:43:33.618 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:14:b1:87:28:66:b1:44:bc:d6:30:43:fe:d8:69:b4:8a:f6:f8:5d] modulus: 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 public exponent: 10001 ] 2021-10-06 16:45:07.170 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:45:07.173 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:45:07.175 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:45:07.176 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:45:07.177 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:45:07.177 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:45:07.178 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:45:07.178 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:45:07.179 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:45:07.179 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:45:07.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:45:07.187 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:45:07.187 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:45:07.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:45:07.341 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:45:07.342 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:45:07.342 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:45:07.343 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:45:07.344 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:45:07.346 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:45:07.346 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:45:07.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:45:07.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:45:07.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:45:07.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:45:07.349 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:45:07.370 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:45:07.371 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:45:07.371 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:45:07.372 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:45:07.377 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:d9:5d:b2:53:50:48:4f:fa:ed:50:c0:9f:3d:e9:2f:33:df:f8:14] modulus: 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 public exponent: 10001 ] 2021-10-06 16:46:39.731 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:46:39.734 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:46:39.737 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:46:39.739 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:46:39.740 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:46:39.741 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:46:39.741 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:46:39.742 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:46:39.743 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:46:39.743 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:46:39.749 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:46:39.751 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:46:39.752 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:46:39.752 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:46:39.935 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:46:39.936 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:46:39.936 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:46:39.936 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:46:39.938 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:46:39.938 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:46:39.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:39.940 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:39.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:39.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:39.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:39.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:39.945 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:39.946 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:39.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:39.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:46:39.954 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:5a:a4:2a:e0:31:22:78:c4:06:22:c2:ca:e8:4e:0b:ad:e1:16:9b] modulus: d53a5c959d2ff9f545096dcb77f09e836a240c872cafedb0c5bf93a8f90eca3dbb4a5465a6de969864f2fd274191f44d387b988bcd2eb64618cb5df59b3236586a6db7c51606a7deb3af2139ba97aa141001bfa0b867b03f8ec824f1bf5926a9fffcb8e30a5a97f40afa2047f983ddb75eb6f9054c9025aa26d829d8b617b97b563732b76c3cac4eb0926cf2e8fd9775671c666266b3a5c21217e63c03e591452ef1a2aea6bc1e8a23e27da0552095818c5faa213da1fc09eed746114f375f64523530f4a81668c47dfbc559128e6c98fa3e502a48ab0a79829a94cf29ce829b33c5f4f4fd476b249af483f61897647a536dc6832759ed25864de3f5029c5b97 public exponent: 10001 ] 2021-10-06 16:46:43.702 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:46:43.703 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:46:43.705 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:46:43.705 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:46:43.706 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:46:43.710 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:46:43.711 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:46:43.711 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:46:43.712 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:46:43.712 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:46:43.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:46:43.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:46:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:46:43.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:46:43.825 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:46:43.826 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:46:43.826 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:46:43.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:46:43.828 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:46:43.829 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:46:43.829 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:43.830 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:43.830 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:43.831 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:43.831 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:43.831 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:43.832 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:46:43.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:46:43.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:46:43.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:46:43.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:42:e6:99:dc:9c:6c:63:2d:78:d4:40:6c:e3:7f:9c:b7:5b:e7:ae] modulus: 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 public exponent: 10001 ] 2021-10-06 16:49:57.303 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:49:57.306 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:49:57.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:49:57.308 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:49:57.309 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:49:57.310 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:49:57.310 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:49:57.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:49:57.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:49:57.312 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:49:57.317 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:49:57.318 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:49:57.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:49:57.319 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:49:57.505 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:49:57.506 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:49:57.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:49:57.507 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:49:57.509 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:49:57.510 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:49:57.510 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:49:57.511 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:49:57.511 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:49:57.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:49:57.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:49:57.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:49:57.513 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:49:57.514 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:49:57.514 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:49:57.515 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:49:57.521 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:8b:24:da:47:61:73:99:59:c0:e5:74:bf:65:ef:5c:d3:82:6c:a8] modulus: b733abad2e7fd1101b47c28626765d9c3a12b263537ef5a91fa8bf1c31d6dec8bc258ec5babcece4c97b8ad5a340e2a3c056bdde93be86bdef49585064ca26ec92d15ce39f10beb044c3ddd40943becc6501c8d6b5f076cf14277c3f114e291d79d03f6120126e8fc8e44bbc9bd9fb4f8b9c50d1d05a51968f6823dcad6839b5e8c0a925e31fcbc991cf59660cfea629e5749b1962e5b364097ab2f8c331ce5a89bea045be31114cc7c27e43c29372be00a75d345612cd671f8ee1117642036e72c0ea2cdd1a7b49df0134723c7fd1cac53fdef80943f432dbe453729504bf8d9b009524711485d3434fcd45ab18914fad82bc68d6577e86096df002695aa551 public exponent: 10001 ] 2021-10-06 16:51:31.301 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:51:31.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:51:31.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:51:31.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:51:31.307 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:51:31.307 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:51:31.308 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:51:31.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:51:31.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:51:31.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:51:31.315 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:51:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:51:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:51:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:51:31.499 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:51:31.500 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:51:31.500 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:51:31.500 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:51:31.503 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:51:31.503 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:51:31.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:31.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:31.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:31.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:31.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:31.505 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:31.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:31.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:31.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:31.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:51:31.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:1d:ce:c9:51:d8:44:e8:48:59:59:c3:5f:14:be:1c:fd:64:83:be] modulus: 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 public exponent: 10001 ] 2021-10-06 16:51:54.895 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:51:54.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:51:54.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:51:54.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:51:54.901 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-06 16:51:54.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:51:54.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:51:54.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:51:54.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:51:54.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:51:54.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:51:54.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:51:54.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:51:54.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:51:55.019 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:51:55.020 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:51:55.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:51:55.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:51:55.022 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:51:55.022 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:51:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:55.023 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:55.024 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:55.024 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:55.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:55.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:51:55.026 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:51:55.026 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:51:55.027 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:51:55.030 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:ed:af:c4:30:da:f5:09:3a:bf:6d:0a:21:20:58:e7:f4:e9:b1:07] modulus: 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 public exponent: 10001 ] 2021-10-06 16:53:05.637 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:53:05.639 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:53:05.642 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:53:05.643 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:53:05.643 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-06 16:53:05.644 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:53:05.644 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:53:05.645 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:53:05.645 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:53:05.646 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:53:05.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:53:05.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:53:05.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:53:05.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:53:05.793 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:53:05.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:53:05.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:53:05.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:53:05.798 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:53:05.798 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:53:05.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:53:05.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:53:05.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:53:05.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:53:05.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:53:05.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:53:05.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:53:05.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:53:05.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:53:05.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:53:05.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:67:55:7c:99:f0:95:7a:47:96:b0:62:5d:51:68:d4:23:a8:d6:0b] modulus: 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 public exponent: 10001 ] 2021-10-06 16:56:04.629 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:56:04.632 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:56:04.635 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:56:04.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:56:04.637 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-06 16:56:04.638 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:56:04.638 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:56:04.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:56:04.639 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:56:04.640 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:56:04.646 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:56:04.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:56:04.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:56:04.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:56:04.781 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:56:04.782 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:56:04.782 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:56:04.782 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:56:04.784 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:56:04.784 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:56:04.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:04.785 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:04.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:04.786 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:04.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:04.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:04.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:04.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:04.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:04.790 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:56:04.795 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 8cd65c1b518f0ddb504d3794cb5a47c4be68aa81eefe95cebbf86de4826058c3b0083e9c7c6dc60240c12f0b8af0894b6d8a327ef83d9adb836637716b9a66c7ea6c6899cc21b83ef1269906ce8428fb31a2abd909b426de0f18e33dc7875f1893f22fb29832d94ad598a3ef74e72d70f25f4a1f3e627ca96d4462b903397ae4268efe12cb3ca5f5b6e646e767dd5cb0409e9848e5245284994f793a1ec4fda565d49ce6286eb907ebd5ff37a7a83d1580087760e9dee2a89c68718f3885ca549b944a0d5148801907c26e02226d3fdc12addc28e93ae147701de1770f7a8ed1e1fa0e5f59d5ecf4c20a9c11ec0baa1dfa9948216c282477f19551a4ffbbdb4a13dfbda66808e08525155eabc6f0263ef3f0d023ef89679dc653f1231ca13c3fdacb488aa0d9b9735f80cbf75f4c5a5c5275e0bbc055ff477ee169ed37527896ac7cf70f6c54f5b9e80a15ae58781837238155ec5c7b17b79407f2b0f2a574819468aa6c3cb537b21063542230cfbe3d1fead2da8e1e494710bc20d7d6c7c409 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:4f:4a:dd:21:02:e0:fd:1d:d6:5b:14:f1:4e:18:cc:fd:44:5a:9d] modulus: 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 public exponent: 10001 ] 2021-10-06 16:56:36.300 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:56:36.301 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:56:36.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-06 16:56:36.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:56:36.304 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-06 16:56:36.304 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:56:36.304 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:56:36.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:56:36.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:56:36.305 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:56:36.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:56:36.310 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:56:36.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:56:36.311 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:56:36.456 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:56:36.459 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:56:36.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:56:36.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:56:36.461 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:56:36.461 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:56:36.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:36.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:36.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:36.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:36.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:36.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:36.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:56:36.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:56:36.465 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:56:36.466 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:56:36.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:fb:96:72:5b:72:e6:66:20:b1:3b:27:b4:54:24:93:22:dd:25:12] modulus: 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 public exponent: 10001 ] 2021-10-06 16:57:10.331 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:57:10.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:57:10.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-06 16:57:10.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:57:10.338 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-06 16:57:10.339 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:57:10.340 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:57:10.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:57:10.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:57:10.342 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:57:10.347 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:57:10.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:57:10.348 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:57:10.349 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:57:10.466 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:57:10.467 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:57:10.468 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:57:10.468 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:57:10.469 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:57:10.470 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:57:10.470 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:57:10.470 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:57:10.471 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:57:10.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:57:10.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:57:10.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:57:10.473 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:57:10.473 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:57:10.473 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:57:10.474 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:57:10.479 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:83:ab:ef:e4:b9:78:a7:5c:e5:6d:15:f2:6e:5e:c4:68:ce:b6:df] modulus: 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 public exponent: 10001 ] 2021-10-06 16:58:58.002 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-06 16:58:58.004 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-06 16:58:58.007 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:58:58.008 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-06 16:58:58.009 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-06 16:58:58.010 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-06 16:58:58.011 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-06 16:58:58.011 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-06 16:58:58.012 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-06 16:58:58.013 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-06 16:58:58.019 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-06 16:58:58.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:58:58.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-06 16:58:58.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:58:58.162 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-06 16:58:58.163 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-06 16:58:58.164 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-06 16:58:58.165 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-06 16:58:58.167 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-06 16:58:58.167 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-06 16:58:58.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:58:58.168 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:58:58.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:58:58.169 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:58:58.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:58:58.170 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:58:58.171 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-06 16:58:58.171 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-06 16:58:58.171 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-06 16:58:58.172 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-06 16:58:58.177 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42474348426084461312925679393310124907799222908 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 06 13:24:54 UTC 2021 Final Date: Mon Oct 06 13:24:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:67:ac:b3:0c:42:f2:df:cd:52:26:e1:23:dd:aa:ca:02:c1:42:b5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3bdeb4c19905cf77159b98cce7795893845c8e35 7e54d8cb71bf57729c7e82f2fdd43c9d90f5260a 83f12e6e89da2dbb4f37423fc1299b42ecafca1a 667ce05351da17f7a609e66d3f285dfb042f33d9 d2c08f7cc2b1d505540264d29463eb5627a0c88c 0c62762774877ac1f2bff8665918bc5973a6a330 ca30de8b96935b166cb9462566df6d89d5c6e724 ffb65a9ec5031ef99373ecd400de445435511ad0 3ea8bca90c46a6979534156516444c3c1c110ea2 ab9deefad509f5c48ae0ecf533686eaa1709ef83 b886d71878acd24f4792a58fc38e9a03203a72c6 28ae79e456ee6b2d164912f6b518d29ef6d615f9 1d3eb549018787d8af0eb72865e7e29f2968358e 8ff6544591d9ac9b8e9d2385c0b0e56e8d712c40 4617a3465b8fa11e047f9c879636c9f609a0fac5 ce2068dc47a566925f7fc16f4fa7e1f1467ebacb 37857deb107e5691d329b64fffcc41eeea2b9a76 3c1113f06556eeade9b0431b6be660615239a6a7 713d9c83e1d52f850320800f1026d9f91e70d770 dc29e03c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:67:b1:b3:f2:07:0e:55:16:11:a7:30:9b:65:ea:77:44:4b:e3:64] modulus: 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 public exponent: 10001 ]