By type
2021-10-26 05:56:39,297 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-26 05:56:40,209 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-26 05:56:40.972 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-26 05:56:44.218 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-26 05:56:44.504 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-26 05:56:44.649 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-26 05:56:46.797 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.089 seconds (JVM running for 10.01) 2021-10-26 05:57:43.647 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 05:57:43.664 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 05:57:43.714 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-26 05:57:43.725 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 05:57:43.759 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-26 05:57:43.764 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 05:57:43.765 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 05:57:43.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 05:57:43.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 05:57:43.773 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 05:57:43.781 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 05:57:43.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 05:57:43.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 05:57:43.858 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 05:57:43.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 05:57:43.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 05:57:44.531 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 05:57:44.539 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 05:57:44.540 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 05:57:44.545 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 05:57:44.560 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 05:57:44.562 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 05:57:44.563 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 05:57:44.563 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 05:57:44.564 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 05:57:44.580 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 05:57:44.580 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 05:57:44.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 05:57:44.587 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 05:57:44.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 05:57:44.589 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 05:57:44.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 05:57:44.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:e6:73:d4:71:ca:36:1d:f6:32:cd:c2:d1:84:ed:1c:c6:70:c5:95] modulus: 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 public exponent: 10001 ] 2021-10-26 07:41:06.651 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:41:06.656 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:41:06.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-26 07:41:06.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:41:06.665 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-26 07:41:06.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:41:06.667 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:41:06.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:41:06.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:41:06.673 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:41:06.686 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:41:06.691 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:41:06.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:41:06.693 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:41:06.854 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:41:06.854 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:41:06.855 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:41:06.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:41:06.859 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:41:06.860 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:41:06.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:41:06.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:41:06.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:41:06.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:41:06.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:41:06.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:41:06.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:41:06.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:41:06.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:41:06.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:41:06.873 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:8c:7e:0a:89:1d:7a:ad:20:1c:29:e6:c6:46:99:25:0a:61:e8:ea] modulus: ca96ff13a4f6aed1bc4f3f5dbad572d2d517e81ce4fb8c341cb013eb6ff743a4f851d0535dd9b8e38d04ff1070cb56ffb17a67aaf4be91f4301553c7925c38b6259c477e28de60fade8fd6d97a336f1922c59f60d57b73abbfd91a0d9af901e415bdc77048608c57b14e67ff080430ae0e5bd972e832adc2dfc2180f625a618852a0c04c30b21e82d592785d54bd895505d56af22a420c2bf342e74a00001d2fa2cba036416f3f4b939d462dbcbef350ceda30802f707a32852c7c678395376ad591bb600ccb0664cecca7c67424f5aa1ae732d8a3261e252f688c7720f79632d636c72ff0709310124dd7fc75eb0f53d89c71a090a4bb6a67098a62091b5297 public exponent: 10001 ] 2021-10-26 07:42:23.036 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:42:23.038 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:42:23.040 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-26 07:42:23.041 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:42:23.042 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-26 07:42:23.043 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:42:23.043 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:42:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:42:23.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:42:23.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:42:23.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:42:23.052 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:42:23.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:42:23.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:42:23.208 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:42:23.210 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:42:23.210 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:42:23.211 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:42:23.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:42:23.215 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:42:23.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:42:23.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:42:23.217 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:42:23.218 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:42:23.219 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:42:23.220 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:42:23.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:42:23.222 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:42:23.222 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:42:23.223 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:42:23.228 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:c3:a3:7c:2b:9c:a3:ae:5e:98:b5:e1:72:7c:e7:db:2a:8f:80:28] modulus: d0fcd39bc075a8529bd303e42682071e6ee3f259360f7dc1962bfe19dca04a2eaa79d04aaee6841ca5601f50718cae96f464cc01b5bd0384ceb78f102f25f4d3544b43daa97e1665b95ceaf33cd85cb4ed6887f16213de58c3142b59c698665e39b4721673c705b99d0cbe274fe1a61112b3404baf797e9b77846e9111a976f444747547f056ecaa06de0f687ba7f5a0758c8d8e3b25a22ac77d71ea3713dab37d3a67aef71fc6ab71e5d709b074c24038487c0700cd43d10825cc108ae12ae16ea1c60f505aeb64e4f2ec9190d9d1716bc8af91373841d9ceb87c9240433104a3468b90b0301643b2580e831ae307c5ce085e1c4fbecbd957040f02f370ab25 public exponent: 10001 ] 2021-10-26 07:44:12.517 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:44:12.520 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:44:12.523 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-26 07:44:12.525 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:44:12.525 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-26 07:44:12.527 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:44:12.527 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:44:12.528 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:44:12.528 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:44:12.529 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:44:12.536 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:44:12.537 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:44:12.538 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:44:12.539 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:44:12.745 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:44:12.746 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:44:12.747 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:44:12.747 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:44:12.749 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:44:12.750 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:44:12.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:44:12.750 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:44:12.751 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:44:12.752 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:44:12.752 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:44:12.752 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:44:12.753 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:44:12.754 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:44:12.754 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:44:12.755 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:44:12.760 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:62:2c:5d:27:d9:ff:c7:2b:4a:60:a0:0d:0b:4d:bf:14:50:3a:55] modulus: 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 public exponent: 10001 ] 2021-10-26 07:45:56.692 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:45:56.695 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:45:56.698 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-26 07:45:56.699 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:45:56.699 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-26 07:45:56.700 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:45:56.701 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:45:56.702 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:45:56.704 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:45:56.704 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:45:56.710 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:45:56.712 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:45:56.712 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:45:56.713 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:45:56.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:45:56.879 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:45:56.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:45:56.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:45:56.882 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:45:56.883 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:45:56.883 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:45:56.884 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:45:56.884 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:45:56.885 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:45:56.885 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:45:56.886 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:45:56.886 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:45:56.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:45:56.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:45:56.888 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:45:56.892 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:68:30:1b:b2:76:c8:90:e7:42:97:7a:8d:02:b1:8a:32:c1:24:2f] modulus: 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 public exponent: 10001 ] 2021-10-26 07:46:04.637 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:46:04.639 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:46:04.640 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-26 07:46:04.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:46:04.641 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-26 07:46:04.642 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:46:04.643 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:46:04.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:46:04.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:46:04.644 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:46:04.650 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:46:04.652 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:46:04.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:46:04.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:46:04.778 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:46:04.778 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:46:04.779 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:46:04.779 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:46:04.780 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:46:04.781 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:46:04.781 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:04.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:04.782 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:04.783 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:04.784 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:04.784 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:04.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:04.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:04.785 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:04.786 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:46:04.790 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:eb:4f:33:63:4f:59:83:c2:85:de:8e:90:bc:15:53:17:93:69:5c] modulus: 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 public exponent: 10001 ] 2021-10-26 07:46:29.014 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:46:29.016 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:46:29.018 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-26 07:46:29.019 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:46:29.019 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-26 07:46:29.020 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:46:29.020 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:46:29.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:46:29.021 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:46:29.022 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:46:29.026 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:46:29.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:46:29.028 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:46:29.028 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:46:29.189 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:46:29.191 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:46:29.191 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:46:29.192 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:46:29.195 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:46:29.196 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:46:29.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:29.197 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:29.198 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:29.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:29.199 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:29.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:29.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:46:29.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:46:29.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:46:29.202 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:46:29.206 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:7b:58:ab:f5:fe:4d:c4:43:31:e8:31:83:25:9f:d4:25:c1:07:17] modulus: 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 public exponent: 10001 ] 2021-10-26 07:47:03.162 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:47:03.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:47:03.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-26 07:47:03.167 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:47:03.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-26 07:47:03.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:47:03.169 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:47:03.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:47:03.170 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:47:03.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:47:03.176 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:47:03.177 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:47:03.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:47:03.178 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:47:03.310 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:47:03.313 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:47:03.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:47:03.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:47:03.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:47:03.317 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:47:03.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:47:03.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:47:03.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:47:03.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:47:03.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:47:03.320 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:47:03.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:47:03.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:47:03.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:47:03.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:47:03.327 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:c3:6b:f9:f1:5f:49:e9:a6:81:76:a8:e0:71:57:47:b5:e3:21:bf] modulus: ba0157539f35360d84d760acaf4dbebd2ae538fd19455a766eb0719c5f3046ddb37a822d2dc5484ec6c8768c8630c4eb39e1eb9af0ce43466656daa8b813cb8225ab5cdc8b2736ce4287a1cee51d623f010fef02a59fbb57e8554397ef94733ea97b1fa94fa36833c9e5f59c7220fd2d8a3b17dd390010d3872364321d1093c4b59f498a6bd96d42458cf68fdedf6af5e191b4d481c1faffa55128b1d10d172bf93031a818e1fdd9dfb108ba91cf44f6f8cd91d9ab088577f3ebfc0d9571516fc21a175263398c366136482f58b90009adccf33535f70ca3fa2854f80494e5b974912f5ebf1a44d44ca38d3b6b3dc0a9474ed52a923d217dba2ba79f0f8d0405 public exponent: 10001 ] 2021-10-26 07:48:49.108 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:48:49.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:48:49.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-26 07:48:49.114 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:48:49.114 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-26 07:48:49.115 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:48:49.115 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:48:49.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:48:49.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:48:49.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:48:49.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:48:49.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:48:49.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:48:49.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:48:49.269 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:48:49.272 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:48:49.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:48:49.272 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:48:49.274 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:48:49.274 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:48:49.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:48:49.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:48:49.275 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:48:49.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:48:49.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:48:49.276 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:48:49.277 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:48:49.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:48:49.278 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:48:49.279 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:48:49.283 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:a9:79:e5:4f:63:95:41:1e:b3:23:17:75:25:c5:c6:78:0a:a1:64] modulus: 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 public exponent: 10001 ] 2021-10-26 07:58:31.301 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-26 07:58:31.304 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-26 07:58:31.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-26 07:58:31.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-26 07:58:31.307 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-26 07:58:31.308 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-26 07:58:31.308 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-26 07:58:31.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-26 07:58:31.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-26 07:58:31.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-26 07:58:31.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-26 07:58:31.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:58:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-26 07:58:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:58:31.464 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-26 07:58:31.464 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-26 07:58:31.465 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-26 07:58:31.465 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-26 07:58:31.466 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-26 07:58:31.467 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-26 07:58:31.467 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:58:31.467 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:58:31.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:58:31.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:58:31.469 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:58:31.469 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:58:31.470 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-26 07:58:31.470 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-26 07:58:31.470 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-26 07:58:31.471 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-26 07:58:31.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 663838185038368736768695760232781041896290811643 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 26 05:54:06 UTC 2021 Final Date: Sun Oct 26 05:54:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ce7794da9e58f0fda32ba9b552482ee037511922 d496d8ffd67ecec609b610d4f7ca7084f7d37466 effd84ca55995ed76dea13787b2477734f1d9c20 65b057591bfa27e6edf45f9559f8444980950b0c 3e76cabf275bf60f0e7365aeb353632a9fd29bb4 3fb4d07fc3cd5ac8c94934300517487587d0cb8f 532109860b1c17b3c94f468a03a72ce1e63b8946 39a284911ff81d677741ea693181e01496b40b8d ab503e7344c8fcb33910070a0d7ba95963a5ac43 7fc3233b23dac43fc7fa25c51be475c485c6a266 eb7cfb8b13837ba17d15c78cf98600a5f09129e3 0d726fdae1db09dfa8f34bf1a7efc72b0d39defe aa065e4b6387ef600e9d82c9db5977f7c51c9a32 b93dc2123ced9debd0b25f4555d288fe5f595856 52b4fbebdfdfdc19597c8851eadc82612bfbb70f e54affa0d747dab8212773167abf95d8d0c379a9 78949983d60fda12e345c3416e82011369a1af9d db6bab8df9f69f8ea33215cd8bdd7523ea100ec6 a351d367f5bb438f307c221170e24f15c5da42f5 7576dccf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:c5:11:15:f4:42:e6:03:1c:3c:96:c9:5e:68:f6:c6:e7:e3:d5:36] modulus: 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 public exponent: 10001 ]