By type
2021-07-26 09:49:38,694 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-07-26 09:49:39,407 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-07-26 09:49:40.051 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-07-26 09:49:42.290 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-07-26 09:49:42.495 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-07-26 09:49:42.651 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-07-26 09:49:44.525 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.272 seconds (JVM running for 7.983) 2021-07-26 09:51:26.045 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 09:51:26.056 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 09:51:26.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-26 09:51:26.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 09:51:26.115 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-26 09:51:26.119 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 09:51:26.123 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 09:51:26.124 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 09:51:26.125 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 09:51:26.133 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 09:51:26.136 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 09:51:26.167 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 09:51:26.175 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 09:51:26.176 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 09:51:26.188 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 09:51:26.692 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 09:51:26.696 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 09:51:26.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 09:51:26.702 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 09:51:26.704 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 09:51:26.704 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 09:51:26.707 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 09:51:26.708 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 09:51:26.715 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 09:51:26.716 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 09:51:26.717 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 09:51:26.718 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 09:51:26.718 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 09:51:26.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 09:51:26.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 09:51:26.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 09:51:26.750 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 09:51:26.776 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:09:2d:c9:ff:f3:96:43:69:b5:27:b9:69:49:a0:1e:7e:cd:49:4e] modulus: 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 public exponent: 10001 ] 2021-07-26 09:51:26.863 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 09:51:26.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 09:51:26.867 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-07-26 09:51:26.867 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 09:51:26.868 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector }, SANs: [dcae-ves-collector, ves-collector, ves] } 2021-07-26 09:51:26.868 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 09:51:26.869 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 09:51:26.869 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 09:51:26.870 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 09:51:26.876 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 09:51:26.877 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 09:51:26.877 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 09:51:26.880 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 09:51:26.943 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 09:51:26.944 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 09:51:26.944 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 09:51:26.947 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 09:51:26.948 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 09:51:26.948 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 09:51:26.950 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 09:51:26.950 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 09:51:26.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 09:51:26.951 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 09:51:26.952 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 09:51:26.952 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 09:51:26.952 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 09:51:26.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 09:51:26.953 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 09:51:26.954 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 09:51:26.955 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 09:51:26.958 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:ef:6d:77:27:2a:92:fb:3d:7e:e6:ab:16:6f:e8:5a:6e:df:0e:d2] modulus: cdfa24c6c489c1b171612cfcbf3666582c3ced786476f60303a608ad959471de8988689789773ac4bcf3312f3132b35d75883e60eaa60b7c9050e5e14bb182211cbc27887bd9d82fd95265cbab5c1620141eb21372430af4b0fcb75407e74e1679ece5e83373cd9788c75446a5d65b2b7a3c36b8d5a27b8a11022a0ed9ce4b894b9e2b02311dc8e51fc0a63e60e64a813cf5b315ca796c006771434304e51845bf73e98414a38195b0da622687dd350e522f7c4bf4fb642764028fcad8d97fbf1d82b957bb69c77bf3895044a7857534cb980c07d42b4d89043b5ee1bbb294e0c8e87de7b26a0593934f62c196398f5da1d2d78f3d60c2588fb21570d4f086f5 public exponent: 10001 ] 2021-07-26 10:30:59.383 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 10:30:59.388 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 10:30:59.392 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-26 10:30:59.393 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 10:30:59.394 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-26 10:30:59.395 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 10:30:59.396 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 10:30:59.396 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 10:30:59.397 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 10:30:59.405 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 10:30:59.407 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:30:59.407 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:30:59.410 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 10:30:59.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 10:30:59.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 10:30:59.574 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 10:30:59.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 10:30:59.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 10:30:59.577 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 10:30:59.579 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 10:30:59.579 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 10:30:59.580 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 10:30:59.580 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 10:30:59.581 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:30:59.581 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:30:59.581 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:30:59.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:30:59.583 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:30:59.583 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:30:59.584 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 10:30:59.588 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:6a:6b:52:82:cc:95:78:ca:c1:08:dd:b7:b5:1d:a6:51:93:7b:91] modulus: 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 public exponent: 10001 ] 2021-07-26 10:33:32.159 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 10:33:32.162 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 10:33:32.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-26 10:33:32.166 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 10:33:32.166 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-26 10:33:32.168 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 10:33:32.168 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 10:33:32.169 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 10:33:32.170 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 10:33:32.180 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 10:33:32.181 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:33:32.183 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:33:32.185 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 10:33:32.343 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 10:33:32.344 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 10:33:32.344 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 10:33:32.348 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 10:33:32.349 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 10:33:32.349 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 10:33:32.350 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 10:33:32.351 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 10:33:32.351 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 10:33:32.352 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 10:33:32.352 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:33:32.353 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:33:32.353 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:33:32.354 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:33:32.354 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:33:32.356 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:33:32.357 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 10:33:32.360 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: dad1af1a531524f8549c3d24b4a96bd244449eb6ba4835ae1f3281484b55595c789b069b61dd52dc80335e7dcf387d3790a5995c9ce8ef36710cc26e928052f0c9324b5b07549a7db9d53a0bfa4975f80b46e9d8983234055c5e17774631278ab82097270ff4fd2e88bb220f17a9e532ee973c273c0af9af0a550328b8e629abbf5fd736a255c16be1add2f4b7a10bfff73f1c09922f40f47c36ae0cb45839f814f3e25d23dfb982f7058bc162c35122cdabd34546b7938379cdcf72622a8b1b84bcb10dad08a382b7af95702f397bf202e7dee9adaf4b553c14ce3ab1938c18b283eb63a05436e4cdeea90d7a2d337d1b80c524830de9b5ebd3caaf2eb173689fda700f09c6af8c36bff09acb7df9cb35f2b0897ecf5989bc0aee2ca1cda29eb87c8efa050c9eb603a4091537a2b6b26bc618d50061a1c21ede1b0cd4633bc146cac504e48150e5c71902511ff09373b59760f87226ff3020cb6374a0f64a584a245963a324e68721f5cc38478c84f7a48dfdf229e2cc49e2d0c722b8864ffb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:df:8a:6b:58:59:49:9e:49:e7:e8:ba:c7:a2:1d:4d:d7:f0:13:a4] modulus: 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 public exponent: 10001 ] 2021-07-26 10:35:05.537 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 10:35:05.539 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 10:35:05.542 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-26 10:35:05.543 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 10:35:05.544 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-26 10:35:05.545 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 10:35:05.546 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 10:35:05.546 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 10:35:05.547 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 10:35:05.553 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 10:35:05.554 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:35:05.555 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:35:05.556 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 10:35:05.718 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 10:35:05.718 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 10:35:05.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 10:35:05.720 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 10:35:05.721 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 10:35:05.721 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 10:35:05.722 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 10:35:05.723 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 10:35:05.723 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 10:35:05.723 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 10:35:05.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:35:05.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:35:05.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:35:05.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:35:05.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:35:05.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:35:05.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 10:35:05.730 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:c1:54:96:10:14:00:a0:37:86:20:5b:10:85:b2:d4:8b:c4:d7:77] modulus: ca2b6025aa5b557106afddf21f027e68a607bba7f6843ceb214f5c4ec6a760440c069088351313a989826ebd268af6779bdaebe8e585a75b5d16e6260437c231805f5e7cdac0f2c5976221258b6a1236a89ca8141bbb1fc59283a2fa9f8e601deef8da53db884cee46e4e8a805ccb0b47b78e864f7827b8651c8aa875f65e97ad8471ff8230dccaf2feb9718e6b8a3dbbf07695cce9eb303a0d38ab15c83f0a03a6409f7d18c04017ba3c1b0e3bd61e3e0d3d39dfbbf1fe26f8d0e40645062aa6da6e3f23845a32553a4c6dba660259f8ee285f76f3bd8ddf478192184624bc7c6da267f75c1c2778437e6a28cb010d43c2a41ca5dc77c0adee5c4563fd60993 public exponent: 10001 ] 2021-07-26 10:45:21.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-07-26 10:45:21.649 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-07-26 10:45:21.651 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-dev }, SANs: [ves-dev] } 2021-07-26 10:45:21.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-26 10:45:21.653 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-dev }, SANs: [ves-dev] } 2021-07-26 10:45:21.654 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-26 10:45:21.654 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-07-26 10:45:21.655 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-07-26 10:45:21.655 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-07-26 10:45:21.663 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-07-26 10:45:21.664 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:45:21.664 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-07-26 10:45:21.666 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-07-26 10:45:21.786 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-07-26 10:45:21.787 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-07-26 10:45:21.788 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-07-26 10:45:21.790 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-07-26 10:45:21.792 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1333 2021-07-26 10:45:21.792 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-07-26 10:45:21.794 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-26 10:45:21.795 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-07-26 10:45:21.795 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-07-26 10:45:21.796 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-07-26 10:45:21.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:45:21.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:45:21.797 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:45:21.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-26 10:45:21.798 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-07-26 10:45:21.799 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-07-26 10:45:21.800 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-dev,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-26 10:45:21.803 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 288683349354755377729943066664656677919523013137 IssuerDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 26 09:45:38 UTC 2021 Final Date: Sat Jul 26 09:45:37 UTC 2031 SubjectDN: UID=c-0d1au2ol6t7brr2fo,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:99:8c:90:2c:35:89:d7:e3:2b:47:2e:70:77:6c:a8:e1:13:b8:04] modulus: dad1af1a531524f8549c3d24b4a96bd244449eb6ba4835ae1f3281484b55595c789b069b61dd52dc80335e7dcf387d3790a5995c9ce8ef36710cc26e928052f0c9324b5b07549a7db9d53a0bfa4975f80b46e9d8983234055c5e17774631278ab82097270ff4fd2e88bb220f17a9e532ee973c273c0af9af0a550328b8e629abbf5fd736a255c16be1add2f4b7a10bfff73f1c09922f40f47c36ae0cb45839f814f3e25d23dfb982f7058bc162c35122cdabd34546b7938379cdcf72622a8b1b84bcb10dad08a382b7af95702f397bf202e7dee9adaf4b553c14ce3ab1938c18b283eb63a05436e4cdeea90d7a2d337d1b80c524830de9b5ebd3caaf2eb173689fda700f09c6af8c36bff09acb7df9cb35f2b0897ecf5989bc0aee2ca1cda29eb87c8efa050c9eb603a4091537a2b6b26bc618d50061a1c21ede1b0cd4633bc146cac504e48150e5c71902511ff09373b59760f87226ff3020cb6374a0f64a584a245963a324e68721f5cc38478c84f7a48dfdf229e2cc49e2d0c722b8864ffb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4bcc7bae32cd6a5b658158f415f4f7126972e029 691af3cdcbcd3f9a72e7eebba8c23c54f8b006f3 ddae3dc0b86fcad18c69e4d54e036197f2a2ff85 7dee7cf9b314ec5305cd72705e707c7d15d12769 a7910c02ba8c626b07f167d77dabe984680a0057 3bd973caba1c46a9a69e7b89f612134ed244fccf 87449bee923d83110bea1cbbffdeff891b6d8c4a 3c1beb2771915f206a4e87fee53da7ed985fbbb0 3258f205ffdf381fb85da18d2e84d6b08c2600c3 0d21681d70b644861c308a715c42dd7723243a1a d43ac7877c2d368506cee625c2a3c63f84a42837 681dc234f747c4170eef8fb86a4ef2ff382e7670 338713a29c7cafdbce8c3f84853acd97e50091b4 f25e51e2cc268c19dcd1c18317f8f9406433ca2f 1c2d2b6cc5945701ae69721e0554afbeb0374dc2 ab74671b59f7d6bada75c1f0ad38fa5c7c1e4c9c a9f3712c84646725ab47c36260aff41f63990be9 bff59f7b77dfe2a18f979909b125be4007784702 3dc63e237b426de62d33e04287cf26d21a93b4d9 fc0576ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:97:53:62:fa:a6:4b:64:9e:73:5d:81:df:89:36:f5:d0:14:48:15] modulus: 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 public exponent: 10001 ]