By type
2021-11-24 09:31:54,595 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-24 09:31:55,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-24 09:31:56.174 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-24 09:31:59.275 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-24 09:31:59.523 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-24 09:31:59.668 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-24 09:32:01.748 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.807 seconds (JVM running for 9.559) 2021-11-24 09:32:45.740 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 09:32:45.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 09:32:45.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 09:32:45.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 09:32:45.822 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 09:32:45.826 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 09:32:45.827 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 09:32:45.829 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 09:32:45.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 09:32:45.834 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 09:32:45.841 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 09:32:45.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 09:32:45.888 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 09:32:45.896 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 09:32:45.896 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 09:32:45.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:32:46.793 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 09:32:46.797 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 09:32:46.798 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 09:32:46.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:32:46.810 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 09:32:46.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 09:32:46.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.839 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.839 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 09:32:46.887 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:52:82:95:a7:7b:8d:9a:57:31:ce:55:91:ed:22:b4:a5:ec:4e:98] modulus: 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 public exponent: 10001 ] 2021-11-24 11:25:04.012 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:25:04.015 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:25:04.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 11:25:04.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:25:04.020 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 11:25:04.021 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:25:04.021 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:25:04.022 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:25:04.022 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:25:04.023 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:25:04.033 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:25:04.034 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:25:04.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:25:04.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:25:04.238 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:25:04.239 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:25:04.240 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:25:04.240 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:25:04.243 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:25:04.245 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:25:04.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.246 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.247 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.249 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.249 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.250 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.252 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:25:04.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:c4:28:ed:76:4d:39:18:66:e2:ff:93:9e:05:7b:b4:98:b3:99:88] modulus: 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 public exponent: 10001 ] 2021-11-24 11:26:36.516 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:26:36.519 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:26:36.523 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:26:36.524 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:26:36.525 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:26:36.526 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:26:36.526 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:26:36.526 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:26:36.527 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:26:36.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:26:36.533 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:26:36.534 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:26:36.535 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:26:36.535 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:26:36.728 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:26:36.729 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:26:36.729 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:26:36.730 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:26:36.732 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:26:36.733 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:26:36.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.736 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.740 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:26:36.745 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:00:46:8c:2d:b9:25:80:4c:1e:45:ff:42:49:f0:4d:6c:9a:48:7e] modulus: c2089b5fbe11804456660841a511544a6ba8e100164f73f5d8ccf409a9524d345ccf62aa453d6752efc62e5f8ba0ca39f9f703e30bdb92866d48e7e662de5ff3f98f16c5eb313a5eb55040069d3dbd3a2206c91698e40c451c7c8a035e6ef93a3939eb4f756a407ce325378b2d02edbfccae57637ad222cd515b29ed766f0363e524b40e4259c892bc0590e8475e35e00f41b98143207ab0b581b0a191c3e4403eaccb05f72abe58e12df4812208f05e4ad955e77bf5484075f685620dbce77d2857e24139e024ac73bf1e2d767a8c8bc28f1c4b46fd749d026812315ccae6b6ff43a3c2c30a7aab37c55a8dbd8cb38926fed1826eadd6c52e9aa6c201d031b3 public exponent: 10001 ] 2021-11-24 11:28:10.615 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:28:10.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:28:10.622 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:28:10.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:28:10.624 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:28:10.625 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:28:10.626 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:28:10.626 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:28:10.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:28:10.627 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:28:10.633 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:28:10.634 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:28:10.634 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:28:10.634 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:28:10.839 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:28:10.840 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:28:10.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:28:10.841 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:28:10.843 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:28:10.844 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:28:10.844 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.845 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.845 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.846 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.847 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.849 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:28:10.855 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:2b:4c:f9:95:01:11:fd:5e:d1:21:44:da:33:78:51:88:26:e4:c8] modulus: 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 public exponent: 10001 ] 2021-11-24 11:29:37.247 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:29:37.249 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:29:37.252 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:29:37.253 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:29:37.254 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:29:37.254 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:29:37.255 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:29:37.255 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:29:37.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:29:37.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:29:37.262 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:29:37.262 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:29:37.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:29:37.263 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:29:37.454 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:29:37.454 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:29:37.455 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:29:37.455 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:29:37.457 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:29:37.458 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:29:37.458 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.459 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.460 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.461 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.462 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.463 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:29:37.468 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:59:7a:45:35:07:91:b0:57:00:82:dd:9e:f1:ed:1c:65:f3:ac:da] modulus: c460b67ec29b9f6f59a8b6cefec158b8abf6dfd30515124eba4c54773a3d74a301c63971ac57e5df1699377d72c165558b1f4ddc5b236a4ef759dba51140b83758f3ea0046c6039664d64de20f21b83f18ff032402cf8c71004b75b199b2fb264bc203f1ffda9167b357214d30d9b9252b46bc7226214b2f08a8c9eaa6a5a7c46decd5431c1bc737e4d3de65bc6d6fd8ba9e11e66311b6b6aedf63d401648de937a9d89e21dbbadedf41909c15f991cd0b1fd843c0abb0e91d683966109891d145537f28dcc1fad57b6fd2d2b157a65db3b97562f2c4ff92b862215e702f8cce4ba659f1838873b2f9ece39a704d2eba198aef97e5c50bc004cac5c0c9fed643 public exponent: 10001 ] 2021-11-24 11:30:09.241 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:30:09.242 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:30:09.243 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 11:30:09.244 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:09.244 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 11:30:09.245 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:09.245 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:30:09.245 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:30:09.246 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:09.246 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:30:09.255 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:30:09.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:09.256 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:09.257 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:09.392 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:30:09.393 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:30:09.393 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:30:09.393 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:09.395 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:30:09.395 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:09.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.396 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.397 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.398 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.399 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.399 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:09.403 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:a5:de:6c:14:a7:e9:b7:27:0f:c1:43:09:9f:f3:91:d2:79:54:a2] modulus: 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 public exponent: 10001 ] 2021-11-24 11:30:40.667 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:30:40.675 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:30:40.678 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 11:30:40.679 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:40.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 11:30:40.685 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:40.686 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:30:40.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:30:40.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:40.699 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:30:40.704 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:30:40.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:40.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:40.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:40.887 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:30:40.888 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:30:40.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:30:40.888 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:40.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:30:40.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:40.891 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.892 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.893 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.896 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:40.919 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:7c:ce:ba:d5:37:f9:ce:42:11:32:a7:f5:d6:1e:db:6a:32:1a:16] modulus: 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 public exponent: 10001 ] 2021-11-24 11:30:41.655 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:30:41.656 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:30:41.658 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 11:30:41.658 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:41.659 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 11:30:41.659 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:41.660 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:30:41.660 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:30:41.660 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:41.661 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:30:41.666 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:30:41.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:41.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:30:41.667 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:41.760 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:30:41.761 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:30:41.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:30:41.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:41.763 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:30:41.764 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:41.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.768 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:41.773 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:59:13:ec:b2:37:1d:c6:14:bf:1e:b9:b2:32:03:3e:fc:33:01:16] modulus: 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 public exponent: 10001 ] 2021-11-24 11:32:28.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:32:28.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:32:28.992 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:32:28.993 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:32:28.993 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:32:28.994 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:32:28.994 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:32:28.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:32:28.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:32:28.996 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:32:29.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:32:29.002 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:32:29.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:32:29.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:29.211 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:32:29.212 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:32:29.212 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:32:29.213 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:29.215 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:32:29.216 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:32:29.218 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:32:29.230 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:97:46:62:fa:f6:4a:6f:fd:fd:52:87:d0:47:d3:cb:33:86:33:e9] modulus: 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 public exponent: 10001 ] 2021-11-24 11:32:39.216 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-24 11:32:39.221 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-24 11:32:39.228 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:32:39.230 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:32:39.231 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:32:39.232 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-24 11:32:39.232 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-24 11:32:39.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-24 11:32:39.233 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-24 11:32:39.234 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-24 11:32:39.240 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-24 11:32:39.241 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:32:39.242 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-24 11:32:39.242 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:39.373 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-24 11:32:39.374 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-24 11:32:39.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-24 11:32:39.374 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:39.376 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-24 11:32:39.377 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-24 11:32:39.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.383 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:32:39.386 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:c4:16:4b:ef:48:9b:ca:00:58:5c:96:96:01:04:96:04:c2:07:3f] modulus: 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 public exponent: 10001 ]