By type
2021-10-08 06:12:09,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-08 06:12:10,802 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-08 06:12:11.619 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-08 06:12:14.483 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-08 06:12:14.780 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-08 06:12:14.969 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-08 06:12:17.315 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.086 seconds (JVM running for 9.939) 2021-10-08 06:13:09.051 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:13:09.063 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:13:09.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 06:13:09.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:13:09.152 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 06:13:09.155 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:13:09.156 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:13:09.159 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:13:09.160 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:13:09.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:13:09.171 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:13:09.174 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:13:09.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:13:09.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:13:09.224 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:13:09.229 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:13:09.857 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:13:09.863 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:13:09.864 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:13:09.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:13:09.881 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:13:09.883 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:13:09.884 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:13:09.885 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:13:09.886 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:13:09.901 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:13:09.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:13:09.902 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:13:09.908 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:13:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:13:09.909 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:13:09.911 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:13:09.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:1e:b1:d7:79:5f:15:3d:36:36:49:9d:86:b7:e0:f3:8f:52:ff:c9] modulus: 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 public exponent: 10001 ] 2021-10-08 08:26:04.377 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:26:04.381 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:26:04.384 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 08:26:04.385 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:26:04.386 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 08:26:04.387 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:26:04.388 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:26:04.388 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:26:04.389 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:26:04.390 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:26:04.400 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:26:04.401 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:26:04.402 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:26:04.403 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:26:04.593 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:26:04.594 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:26:04.594 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:26:04.595 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:26:04.598 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:26:04.599 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:26:04.599 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:26:04.600 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:26:04.600 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:26:04.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:26:04.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:26:04.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:26:04.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:26:04.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:26:04.604 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:26:04.605 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:26:04.610 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:ae:10:13:67:ef:16:56:a4:57:19:50:d1:9c:8e:f2:c9:04:b4:85] modulus: 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 public exponent: 10001 ] 2021-10-08 08:27:57.175 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:27:57.180 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:27:57.184 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:27:57.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:27:57.188 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:27:57.190 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:27:57.190 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:27:57.191 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:27:57.192 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:27:57.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:27:57.200 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:27:57.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:27:57.202 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:27:57.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:27:57.402 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:27:57.404 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:27:57.405 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:27:57.406 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:27:57.409 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:27:57.410 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:27:57.411 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:27:57.411 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:27:57.412 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:27:57.413 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:27:57.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:27:57.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:27:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:27:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:27:57.418 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:27:57.421 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:27:57.432 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:6c:62:5d:7e:57:30:e2:8b:a2:02:c2:a5:b9:c6:ba:c7:01:27:e3] modulus: c8c1865c87d1cd7631a22d6b2487d8ca4bd1c90aced85670ecf98915b7b285a42a9bb232a5f4f40cb7cc7c0eb39d465aa3737f48f5c804a832485c951096ef173c5a96a6136ab3cb222ff8f2d5d92af179da4f111b026781d46080a5c9a479e720c0522b6742d34be60cf66e72fafad9cfcde80f45c4914bf641032e462f8ff2b4900cc1ea63d42b4b7b746ff71856effea2bbe13c1fe35af5115598f0dc607f6d50bbd974861e4d7f4eac174a8ec361570ae9b72c556504dfdf35ba534a4fafca5a2ffbef23db643b16150b752d84d510a1ff8980c2d79b5a8f271e19a98b6c6392f40cef2120100b44ee3db7c28359e88ca6fde453088d15cfab94e99f8677 public exponent: 10001 ] 2021-10-08 08:32:27.243 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:32:27.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:32:27.250 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:32:27.252 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:32:27.254 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:32:27.255 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:32:27.255 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:32:27.256 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:32:27.257 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:32:27.258 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:32:27.273 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:32:27.274 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:32:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:32:27.275 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:32:27.435 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:32:27.435 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:32:27.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:32:27.436 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:32:27.439 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:32:27.440 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:32:27.441 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:32:27.442 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:32:27.442 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:32:27.443 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:32:27.444 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:32:27.445 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:32:27.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:32:27.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:32:27.447 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:32:27.448 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:32:27.455 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:63:34:5e:84:3e:97:17:e9:08:cb:d2:ce:38:d8:0c:bd:7f:8a:33] modulus: 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 public exponent: 10001 ] 2021-10-08 08:36:53.559 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:36:53.567 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:36:53.581 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 08:36:53.583 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:36:53.584 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 08:36:53.585 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:36:53.586 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:36:53.586 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:36:53.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:36:53.588 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:36:53.596 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:36:53.597 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:36:53.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:36:53.598 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:36:53.791 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:36:53.792 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:36:53.792 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:36:53.793 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:36:53.794 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:36:53.794 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:36:53.795 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:36:53.795 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:36:53.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:36:53.796 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:36:53.797 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:36:53.797 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:36:53.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:36:53.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:36:53.798 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:36:53.799 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:36:53.803 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:2e:55:1e:67:49:36:b5:0b:97:ac:ca:bc:8a:65:8f:d6:08:2a:ec] modulus: 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 public exponent: 10001 ] 2021-10-08 08:39:04.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:39:04.295 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:39:04.298 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:39:04.303 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:39:04.304 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:39:04.305 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:39:04.305 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:39:04.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:39:04.306 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:39:04.307 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:39:04.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:39:04.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:39:04.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:39:04.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:39:04.451 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:39:04.453 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:39:04.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:39:04.455 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:39:04.457 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:39:04.458 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:39:04.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:39:04.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:39:04.460 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:39:04.461 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:39:04.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:39:04.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:39:04.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:39:04.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:39:04.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:39:04.465 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:39:04.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:49:1a:9c:d5:ac:be:ae:97:ac:1c:28:19:cd:ba:32:1b:b6:bf:f4] modulus: 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 public exponent: 10001 ] 2021-10-08 08:41:03.684 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:41:03.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:41:03.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:41:03.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:41:03.692 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:41:03.693 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:41:03.693 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:41:03.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:41:03.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:41:03.695 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:41:03.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:41:03.701 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:03.701 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:03.702 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:03.863 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:41:03.864 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:41:03.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:41:03.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:03.866 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:41:03.867 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:41:03.868 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:03.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:03.869 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:03.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:03.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:03.870 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:03.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:03.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:03.871 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:03.872 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:41:03.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:ba:e4:43:1b:9f:7d:8c:e9:91:01:f0:ad:66:5d:bf:93:3e:db:89] modulus: cbdd9a8fad03fee882e4395b50468e2bd44e7a67bc09d449cd669bf6f94225f6fc6732704c3bc9fd4fe513a8ae372a155896feacd5ef8d182eefe5db453748fdd0cc6ca2aa1135829b3e04198c8ddf24db827f88aeade2d6e0056ff8639cf1c86f670ba8ff979f8ab0d6ae77bc055fbe577f96d24aa91b99476c9915cfedcc1a78300ff408321894c9fb4418a15628641780bc05250ded820b72e5fcdaddc38cddc0906f0ce83f70915a858033c5a93202395eede4b00f44b05a55be4f781de32eb87d49f1e7fb746125018d6ed97428fae181eee4c7405e5e8b0235b326061a5de7d9d3cd0574dbfd48e5bc77f064657ff1156e8cdd7f6e5dc7af57c09e04cf public exponent: 10001 ] 2021-10-08 08:41:04.066 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:41:04.067 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:41:04.069 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:41:04.070 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:41:04.070 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:41:04.072 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:41:04.072 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:41:04.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:41:04.073 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:41:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:41:04.084 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:41:04.085 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:04.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:04.086 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:04.185 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:41:04.199 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:41:04.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:41:04.200 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:04.202 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:41:04.202 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:41:04.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:04.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:04.203 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:04.204 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:04.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:04.205 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:04.206 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:04.206 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:04.207 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:04.209 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:41:04.212 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:be:9b:4a:96:2d:ed:ca:85:46:1d:ec:b6:aa:a2:3e:98:1b:b1:26] modulus: b44cc97e57a801248a3ea0bfc8c51b690ae46169b76d56c591b81c108a57286cd176744bc58436b0842ea844245e85cd86f1258f38b89f478705a191332bc77dbdbd5cb2cfec3a29abd602101036f9a58dc920d13b7234db12bfdfa1eb4878a20c01399fd681048b0f5d90872af97d6942bc98fb84837fdc0a78e8bcaebe4dfa6a464bae8006ff3cd029eb361836a17f60d97b2d47c010c5df3cd836120b2c0cdc592f2c050a0ae27f105f5c5aa710c3593dbef00c76bf3de09ceff30b60ca59217e360a590e3792929d792a4620f92711ac7dbce191f43278f5ae40a0e1c6c848353e0dd977f755fadcb110bc90b914330b2c0d9406313bc413e35ecbdbadfb public exponent: 10001 ] 2021-10-08 08:41:36.954 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:41:36.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:41:36.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-08 08:41:36.963 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:41:36.964 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-08 08:41:36.965 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:41:36.966 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:41:36.968 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:41:36.969 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:41:36.970 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:41:36.979 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:41:36.980 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:36.981 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:41:36.982 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:37.157 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:41:37.158 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:41:37.158 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:41:37.159 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:41:37.161 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:41:37.162 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:41:37.163 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:37.163 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:37.164 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:37.165 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:37.165 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:37.166 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:37.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:41:37.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:41:37.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:41:37.170 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:41:37.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:d5:d5:18:cd:3d:9d:52:b1:73:03:c3:55:88:07:76:97:48:d1:fc] modulus: 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 public exponent: 10001 ] 2021-10-08 08:42:04.963 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:42:04.970 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:42:04.971 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-08 08:42:04.972 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:42:04.972 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-08 08:42:04.973 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:42:04.973 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:42:04.974 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:42:04.974 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:42:04.975 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:42:04.981 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:42:04.982 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:42:04.982 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:42:04.983 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:42:05.105 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:42:05.107 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:42:05.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:42:05.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:42:05.111 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:42:05.112 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:42:05.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:42:05.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:42:05.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:42:05.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:42:05.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:42:05.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:42:05.117 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:42:05.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:42:05.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:42:05.120 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:42:05.123 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:2a:87:10:f4:73:71:e8:bc:93:a1:ec:ff:7b:a2:80:94:cc:72:90] modulus: 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 public exponent: 10001 ] 2021-10-08 08:44:11.050 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:44:11.063 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:44:11.065 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:44:11.066 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:44:11.066 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:44:11.067 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:44:11.067 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:44:11.067 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:44:11.068 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:44:11.068 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:44:11.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:44:11.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:44:11.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:44:11.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:44:11.250 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:44:11.251 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:44:11.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:44:11.251 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:44:11.253 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:44:11.254 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:44:11.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:44:11.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:44:11.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:44:11.256 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:44:11.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:44:11.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:44:11.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:44:11.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:44:11.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:44:11.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:44:11.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:63:91:09:9b:71:da:30:33:ce:ad:9d:6c:14:10:80:52:dc:6c:2a] modulus: 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 public exponent: 10001 ] 2021-10-08 08:46:04.964 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:46:04.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:46:04.969 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:46:04.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:46:04.971 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:46:04.972 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:46:04.972 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:46:04.973 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:46:04.973 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:46:04.974 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:46:04.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:46:04.980 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:46:04.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:46:04.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:46:05.159 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:46:05.160 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:46:05.160 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:46:05.161 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:46:05.163 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:46:05.163 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:46:05.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:46:05.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:46:05.164 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:46:05.165 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:46:05.166 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:46:05.166 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:46:05.167 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:46:05.167 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:46:05.167 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:46:05.168 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:46:05.173 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:10:40:17:06:3d:62:33:f2:35:93:88:08:5f:53:7f:9a:84:d2:f6] modulus: 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 public exponent: 10001 ] 2021-10-08 08:47:42.343 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:47:42.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:47:42.350 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:47:42.352 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:47:42.353 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:47:42.354 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:47:42.354 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:47:42.355 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:47:42.355 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:47:42.356 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:47:42.361 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:47:42.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:47:42.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:47:42.363 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:47:42.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:47:42.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:47:42.538 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:47:42.538 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:47:42.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:47:42.540 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:47:42.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:47:42.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:47:42.541 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:47:42.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:47:42.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:47:42.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:47:42.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:47:42.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:47:42.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:47:42.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:47:42.548 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:90:97:94:8b:13:20:85:85:b3:06:d8:9f:af:23:55:9a:89:c5:82] modulus: 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 public exponent: 10001 ] 2021-10-08 08:49:32.722 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:49:32.725 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:49:32.727 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:49:32.729 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:49:32.729 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:49:32.731 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:49:32.731 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:49:32.733 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:49:32.733 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:49:32.734 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:49:32.740 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:49:32.740 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:49:32.741 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:49:32.741 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:49:32.888 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:49:32.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:49:32.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:49:32.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:49:32.892 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:49:32.892 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:49:32.893 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:49:32.893 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:49:32.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:49:32.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:49:32.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:49:32.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:49:32.896 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:49:32.896 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:49:32.896 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:49:32.898 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:49:32.905 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:81:ee:4b:3a:4b:f6:18:39:0e:e3:b1:0f:e9:3d:35:c1:88:5c:ac] modulus: d21e23dc39ac789e2047c8332a859e6d290fb2be2b80fe6f726238bace74906ded5e9667bfb7a3fe1c346b6c8da3373aa6ec1501e7c2ea1a0578a96eb2d1b99d2550b66e07624fd569360153cae505e6d054cc4bd8d7cbf95ab26c4b306035af216fbf24314e6be90676d4675bf28bdbbbd67837ce600c673a91ab6d964ce9cc439786799d2cffd268b7c1fad1d6cb8d4be636400e9a1488592cf56ace1ba0920e25355cd139a8e092312d8e257956f932a875d3462d5cc49f09531055620e43d06e63f32bd4a0c65bd900b9fe57ae3ac34dc13409623de75dec3a91b5e205af6808bf693dc796a56155298fa0999f8a380dae4ca680c6b3e2874c95099ab9a7 public exponent: 10001 ] 2021-10-08 08:51:37.356 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:51:37.359 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:51:37.361 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:51:37.362 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:51:37.364 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:51:37.365 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:51:37.365 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:51:37.365 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:51:37.366 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:51:37.367 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:51:37.372 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:51:37.373 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:51:37.373 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:51:37.373 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:51:37.548 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:51:37.549 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:51:37.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:51:37.550 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:51:37.551 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:51:37.552 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:51:37.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:51:37.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:51:37.553 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:51:37.553 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:51:37.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:51:37.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:51:37.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:51:37.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:51:37.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:51:37.564 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:51:37.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:ae:49:90:2c:6a:04:71:1f:59:d0:fa:ca:c6:2e:c2:41:98:36:b6] modulus: e39ff6ce7cac7969435ae8334571423ec88c7106ac70ae694197639b3fc370d112f202e50080e5ab99a465868ba4198aaad7a5a767704a15e5da9d3cb66525185bb799de7fb479b71b4beaf2f576f0c24964d9776a246ece31b4ea9b412c43eb12f35c5c6f6bc0ded4c99ecb2abaf63233c35f3b8ed1ffe56f6d11383aee156355b07122aecb14374227dd822158715e92599cf06193a720a70e261a2739552a481e266ed5ff89754852101f0d71ddc571879bc0c92691ac55301d83a378b6caf113531c6d522029b0b21360c8049366c7201264bbc4b2e26e36794f476f7b1e5af29debf7468eaf76b979c547c82df95b21948895095784b4101f082a368e55 public exponent: 10001 ] 2021-10-08 08:55:13.899 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:55:13.902 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:55:13.903 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:55:13.904 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:55:13.905 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 08:55:13.906 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:55:13.906 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:55:13.906 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:55:13.907 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:55:13.907 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:55:13.913 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:55:13.914 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:55:13.914 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:55:13.915 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:55:14.092 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:55:14.093 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:55:14.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:55:14.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:55:14.095 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:55:14.095 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:55:14.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:55:14.096 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:55:14.097 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:55:14.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:55:14.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:55:14.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:55:14.100 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:55:14.100 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:55:14.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:55:14.101 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:55:14.105 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:bc:dc:d5:e3:ed:f5:83:6b:d7:a4:d6:97:34:92:e6:1c:f4:83:50] modulus: c238b893c55521789df89f7bf0ac83205ddfd9c970bccd6fcc1cfa35123c7f8136b94ec3483de1992470d83e326f970018f8bddb81cabba77d6069de7384d724344d22a507d62513e90262d9c697c03081a19ebd5a1a33d05325bec131026ad95594fddb812a91edc74196be5fae287048a36def0ee035d7554215045e41189aa0d59036629bb7645316f085d774b8d9e5c00a95ce39db280a7140e5a5d3c36b003e69e4c6a3ba64d5247606f81c44759b04bdcaf1620456dbe07706e82d7c0165c6b95c6ef137056c4c9e8d5e6a890ae4fb84d208c2b842fb0b2a966afb08ddb5758d7539a334065823e5c6f05b811b787f1c7c4ff04f2cee8d4e6b84fd2537 public exponent: 10001 ] 2021-10-08 08:56:45.662 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:56:45.665 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:56:45.668 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:56:45.670 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:56:45.670 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 08:56:45.671 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:56:45.672 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:56:45.672 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:56:45.673 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:56:45.674 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:56:45.682 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:56:45.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:56:45.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:56:45.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:56:45.893 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:56:45.894 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:56:45.895 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:56:45.895 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:56:45.897 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:56:45.898 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:56:45.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:56:45.898 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:56:45.899 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:56:45.900 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:56:45.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:56:45.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:56:45.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:56:45.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:56:45.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:56:45.906 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:56:45.910 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:b2:c7:4d:43:c5:23:74:c2:5d:38:1b:78:ee:15:8b:79:7f:af:f3] modulus: c787318830018c4ded916f2c4782bd18420e0b96908b3826a3ed8424a86e8844daf1b6b0a9c51eb719f7d5df56a62f41f70781d7927f2a949095ffc82937db1d8603beed495e2d84efd86917477886361b158da7a207a1b9495636054f70fd3747a7d2097fc5ceedb820c6393b67616bd392376078f97511195220b5d0b52c457ceb68602297b118ef4249ac892bdc47a8ba5a8366ea3efaa0c77939a94f03057f71e8dc4914f33b6e194b2a9b0a8cd98bdf4b793970f1cf403c445b40d74af2974119cc89efa2b9abe2b29fddfdb28d46aefa72ebf4538d3208dd4c9c62cbd0a51cce053d6d49dcda3dce23316a0bafe5e2f08665153bb7ae20a58e6fdaccf3 public exponent: 10001 ] 2021-10-08 08:59:04.806 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 08:59:04.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 08:59:04.813 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:59:04.814 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 08:59:04.815 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 08:59:04.815 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 08:59:04.815 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 08:59:04.816 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 08:59:04.816 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 08:59:04.817 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 08:59:04.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 08:59:04.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:59:04.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 08:59:04.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:59:05.004 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 08:59:05.005 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 08:59:05.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 08:59:05.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 08:59:05.007 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 08:59:05.018 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 08:59:05.019 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:59:05.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:59:05.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:59:05.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:59:05.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:59:05.022 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:59:05.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 08:59:05.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 08:59:05.023 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 08:59:05.024 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 08:59:05.028 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 536912771815505287252083537426469429855908649148 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 06:08:08 UTC 2021 Final Date: Wed Oct 08 06:08:07 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a546fc663e26c403bc07c17a93084c80aadf8910 5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0 3af57f502c938c5f6edf272dde30a4d272aca109 51db6da606b1879d55158802fb033355c4719cd6 f59451b9f113b8f9fbbdadf7b53b963437603754 b5ba0f8f7ffc91ee43fde617d26e58062aa969f5 ce2f3010dd3761e033006680ed39fe766a3fb132 55ea6527df087bef5d2c9c92da250c50aaf62744 e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8 c67a241e4da6ab37916b653fd2c472a28a976a74 fc3b61af7d1b8037d2d69a9bb3233dfd195015da 95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08 b99b20eb9a79f73d88e9866e7c943794a5bb0aeb 5f72a65d29649c8326ea125f0a415511ce2e526b 52c8b78d2d9e6bea48a03bc89ad7c7e77520f639 89eb2e6df0a1f3236f49ed261b446269a4f86cd7 53bb1d7bea274fe20e1e0723d0e5b2519ee0b690 f2a6bd63d5400ce2f07f856b4dc76f97ead805f9 1a316532 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:cc:35:dd:79:ef:62:a3:0c:88:54:8a:de:b1:0b:63:f7:1e:97:b2] modulus: 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 public exponent: 10001 ]