By type
2021-10-14 05:56:57,827 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-14 05:56:58,617 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-14 05:56:59.364 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-14 05:57:02.226 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-14 05:57:02.468 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-14 05:57:02.613 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-14 05:57:04.685 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.46 seconds (JVM running for 9.19) 2021-10-14 05:57:52.392 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 05:57:52.404 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 05:57:52.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-14 05:57:52.464 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 05:57:52.490 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-14 05:57:52.494 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 05:57:52.495 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 05:57:52.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 05:57:52.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 05:57:52.504 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 05:57:52.512 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 05:57:52.516 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 05:57:52.559 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 05:57:52.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 05:57:52.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 05:57:52.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 05:57:53.190 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 05:57:53.194 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 05:57:53.195 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 05:57:53.198 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 05:57:53.207 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 05:57:53.209 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 05:57:53.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 05:57:53.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 05:57:53.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 05:57:53.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 05:57:53.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 05:57:53.226 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 05:57:53.235 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 05:57:53.236 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 05:57:53.236 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 05:57:53.238 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 05:57:53.275 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:2c:ec:52:6e:b1:72:4f:eb:63:f2:a7:e1:b5:90:98:2f:85:32:bb] modulus: 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 public exponent: 10001 ] 2021-10-14 08:01:17.115 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:01:17.118 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:01:17.123 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-14 08:01:17.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:01:17.126 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-14 08:01:17.127 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:01:17.128 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:01:17.128 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:01:17.129 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:01:17.130 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:01:17.142 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:01:17.143 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:01:17.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:01:17.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:01:17.357 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:01:17.358 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:01:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:01:17.359 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:01:17.363 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:01:17.363 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:01:17.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:01:17.365 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:01:17.365 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:01:17.366 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:01:17.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:01:17.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:01:17.369 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:01:17.369 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:01:17.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:01:17.371 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:01:17.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:c3:27:c0:7d:d5:fa:c6:6a:89:0b:eb:dc:53:18:9e:60:1e:16:96] modulus: 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 public exponent: 10001 ] 2021-10-14 08:04:51.594 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:04:51.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:04:51.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-14 08:04:51.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:04:51.602 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-14 08:04:51.603 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:04:51.604 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:04:51.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:04:51.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:04:51.606 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:04:51.620 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:04:51.623 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:04:51.623 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:04:51.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:04:51.787 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:04:51.788 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:04:51.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:04:51.788 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:04:51.794 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:04:51.794 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:04:51.795 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:04:51.796 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:04:51.796 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:04:51.797 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:04:51.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:04:51.798 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:04:51.799 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:04:51.799 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:04:51.800 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:04:51.801 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:04:51.806 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:08:d9:c5:95:12:9c:ee:94:f4:d5:2f:55:ee:00:0f:e3:44:c5:56] modulus: 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 public exponent: 10001 ] 2021-10-14 08:05:52.650 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:05:52.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:05:52.658 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:05:52.660 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:05:52.660 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:05:52.661 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:05:52.662 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:05:52.662 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:05:52.663 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:05:52.666 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:05:52.684 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:05:52.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:05:52.686 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:05:52.687 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:05:52.873 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:05:52.875 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:05:52.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:05:52.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:05:52.881 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:05:52.882 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:05:52.883 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:05:52.883 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:05:52.884 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:05:52.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:05:52.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:05:52.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:05:52.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:05:52.889 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:05:52.890 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:05:52.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:05:52.912 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: bd1afb84a8bfccdfa329570406efd45a870f107c0aef3fcab900408b755251cb49b671164c7eec318ba7ea2a677c8d1c03f034a29161f1707c24ab48c7d0433103365293ce0cdc5b752e29508ee8b7eabfda15851f3ffdda12d73fa606e061d87381d2c530c436b5f36a3ccfb781edaf565af29f48f2344bd013daddd50cc840f5a3bb222f038c97d323949dd95ff6a717a162a9f47435fe2b11aa45be128746fbc8b0797c47be28e03d1229284bdf80894bca000fc4b1626d7e3355f8e52e023a8057add677b36966309354d44971c21a1558ce2bdb430308b20b4e6f5d46c28109e27bb1032b08e00944fdfc98feeb15ddfa719326ab138913d580d7937bd20c576b7fa1a15db5dbad9f73c3722aec2c92b6c620186e46c147cc77a937f48dee3999bee3dc3271afebefc96184c66a6c7679fc0d862b386aaf8656ac34e0938f612756fa3387ff7f2868f09a5607a6a55d948dfedcb0f95c5ac24d86dd1b8c5441860e67759cb8fd87b218b87a5ba3e34c70ea7c4ca352ac03c216c8419ce1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:0f:28:80:e9:fb:f1:1d:2e:59:51:92:b9:35:b4:c9:05:cc:da:7e] modulus: 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 public exponent: 10001 ] 2021-10-14 08:06:24.387 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:06:24.390 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:06:24.392 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-14 08:06:24.393 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:06:24.394 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-14 08:06:24.395 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:06:24.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:06:24.397 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:06:24.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:06:24.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:06:24.406 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:06:24.409 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:24.410 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:24.410 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:24.574 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:06:24.576 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:06:24.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:06:24.577 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:24.579 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:06:24.582 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:06:24.584 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:24.584 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:24.585 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:24.587 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:24.587 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:24.588 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:24.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:24.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:24.591 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:24.594 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:06:24.599 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:d5:cc:5f:e5:75:4c:66:3b:a6:b1:a3:d3:23:9c:4e:d0:49:f1:84] modulus: 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 public exponent: 10001 ] 2021-10-14 08:06:41.478 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:06:41.480 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:06:41.481 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:06:41.482 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:06:41.483 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:06:41.483 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:06:41.484 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:06:41.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:06:41.484 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:06:41.485 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:06:41.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:06:41.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:41.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:41.493 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:41.613 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:06:41.614 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:06:41.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:06:41.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:41.617 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:06:41.618 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:06:41.618 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:41.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:41.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:41.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:41.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:41.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:41.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:41.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:41.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:41.623 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:06:41.628 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: bd1afb84a8bfccdfa329570406efd45a870f107c0aef3fcab900408b755251cb49b671164c7eec318ba7ea2a677c8d1c03f034a29161f1707c24ab48c7d0433103365293ce0cdc5b752e29508ee8b7eabfda15851f3ffdda12d73fa606e061d87381d2c530c436b5f36a3ccfb781edaf565af29f48f2344bd013daddd50cc840f5a3bb222f038c97d323949dd95ff6a717a162a9f47435fe2b11aa45be128746fbc8b0797c47be28e03d1229284bdf80894bca000fc4b1626d7e3355f8e52e023a8057add677b36966309354d44971c21a1558ce2bdb430308b20b4e6f5d46c28109e27bb1032b08e00944fdfc98feeb15ddfa719326ab138913d580d7937bd20c576b7fa1a15db5dbad9f73c3722aec2c92b6c620186e46c147cc77a937f48dee3999bee3dc3271afebefc96184c66a6c7679fc0d862b386aaf8656ac34e0938f612756fa3387ff7f2868f09a5607a6a55d948dfedcb0f95c5ac24d86dd1b8c5441860e67759cb8fd87b218b87a5ba3e34c70ea7c4ca352ac03c216c8419ce1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:36:6a:d4:24:98:bb:30:ef:db:c7:60:24:8f:a8:7c:07:69:86:79] modulus: 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 public exponent: 10001 ] 2021-10-14 08:06:42.591 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:06:42.592 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:06:42.597 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:06:42.598 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:06:42.599 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-14 08:06:42.600 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:06:42.600 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:06:42.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:06:42.601 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:06:42.602 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:06:42.606 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:06:42.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:42.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:06:42.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:42.706 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:06:42.706 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:06:42.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:06:42.708 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:06:42.710 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:06:42.710 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:06:42.711 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:42.712 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:42.712 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:42.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:42.718 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:42.719 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:42.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:06:42.720 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:06:42.721 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:06:42.722 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:06:42.727 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:36:6a:d4:24:98:bb:30:ef:db:c7:60:24:8f:a8:7c:07:69:86:79] modulus: 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 public exponent: 10001 ] 2021-10-14 08:07:01.819 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:07:01.821 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:07:01.823 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-14 08:07:01.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:07:01.825 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-14 08:07:01.826 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:07:01.826 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:07:01.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:07:01.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:07:01.828 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:07:01.836 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:07:01.837 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:07:01.838 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:07:01.838 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:07:02.023 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:07:02.028 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:07:02.028 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:07:02.030 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:07:02.034 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:07:02.034 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:07:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:07:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:07:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:07:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:07:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:07:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:07:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:07:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:07:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:07:02.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:07:02.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:a4:10:11:7e:79:0d:16:49:d7:b3:70:ff:e4:ca:80:7d:5b:5a:78] modulus: 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 public exponent: 10001 ] 2021-10-14 08:08:34.968 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:08:34.972 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:08:34.976 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-14 08:08:34.978 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:08:34.978 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-14 08:08:34.982 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:08:34.983 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:08:34.988 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:08:34.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:08:35.005 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:08:35.020 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:08:35.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:08:35.023 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:08:35.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:08:35.230 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:08:35.231 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:08:35.232 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:08:35.232 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:08:35.233 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:08:35.234 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:08:35.235 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:35.235 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:35.235 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:35.236 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:35.236 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:35.237 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:35.237 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:35.238 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:35.238 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:35.239 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:08:35.243 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:95:4e:47:e9:5f:28:d6:62:87:98:12:e7:8e:63:04:e3:dd:2f:95] modulus: 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 public exponent: 10001 ] 2021-10-14 08:08:44.979 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-14 08:08:44.980 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-14 08:08:44.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-14 08:08:44.982 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-14 08:08:44.983 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-14 08:08:44.984 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-14 08:08:44.984 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-14 08:08:44.984 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-14 08:08:44.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-14 08:08:44.985 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-14 08:08:44.996 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-14 08:08:44.996 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:08:44.996 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-14 08:08:44.997 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:08:45.168 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-14 08:08:45.169 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-14 08:08:45.170 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-14 08:08:45.170 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-14 08:08:45.171 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-14 08:08:45.172 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-14 08:08:45.175 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:45.176 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:45.176 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:45.177 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:45.178 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:45.178 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:45.179 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-14 08:08:45.180 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-14 08:08:45.181 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-14 08:08:45.182 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-14 08:08:45.188 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 258041478977839191363069299903358170077930608458 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 14 05:54:18 UTC 2021 Final Date: Tue Oct 14 05:54:17 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138 a5203c62ac6ff250e1db01d086a0c4963f42eb65 63b620f3495f7fcc945077ca1a509a4cd11c9203 206ad787dac65eff25d1ce3f29afd30c2e20fd50 38d15c0393cfb2998247746d8db6fe8fd4f56d36 415f89c592f4111a8c40db0fada97b1fd7c00eb9 c381c2caf59b261aee79413c8e5114f809b0edee 2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4 36278256a69fa1c69487afeea6b005e96e57456a e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5 bd504e943029f750cfa18924d4fe0d2a5d2094c1 45140a34d356b0fd854aa1382011913ea7976234 606a711eece98ba501e924803df54bdba0aaf80d 3090b42aee32b5de0face8f3d2577a162764f43c 0bae3be19dadfcb048783cf98c5be5de2bd4b027 a79b20b8379de21c2cf40e939af7f099f3d65a3b 5fc533da75e10758cc791770edbb9c022adfca9c 6e70f0fc3de398e39ebf1a2fcf8709710ed3e424 3274e364f53fdf2cb52a33fdbc04c1fb017cd622 6a301955 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:47:29:87:46:5d:aa:72:5f:1a:71:59:c0:8f:c8:8b:6d:c2:68:bd] modulus: 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 public exponent: 10001 ]