By type
2021-05-12 00:20:41,235 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-12 00:20:45,437 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-12 00:20:48.427 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-05-12 00:21:01.041 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-12 00:21:02.241 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-05-12 00:21:03.039 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-12 00:21:18.532 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.892 seconds (JVM running for 47.537) 2021-05-12 00:38:29.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 00:38:29.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 00:38:29.424 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 00:38:29.429 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 00:38:29.527 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 00:38:29.531 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 00:38:29.536 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 00:38:29.537 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 00:38:29.538 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 00:38:29.624 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 00:38:29.629 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 00:38:29.827 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 00:38:29.835 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 00:38:29.836 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 00:38:29.939 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 00:38:31.436 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 00:38:31.439 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 00:38:31.440 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 00:38:31.525 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 00:38:31.527 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 00:38:31.529 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 00:38:31.535 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 00:38:31.536 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 00:38:31.542 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 00:38:31.543 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 00:38:31.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 00:38:31.624 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 00:38:31.625 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 00:38:31.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 00:38:31.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 00:38:31.638 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 00:38:31.644 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 00:38:31.827 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:25:45:42:0d:ec:a4:8f:57:3f:54:ee:9b:c5:8c:c6:02:10:26:90] modulus: 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 public exponent: 10001 ] 2021-05-12 02:12:00.741 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 02:12:00.743 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 02:12:00.745 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:12:00.746 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:12:00.747 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:12:00.748 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:12:00.748 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 02:12:00.749 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 02:12:00.749 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 02:12:00.833 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 02:12:00.834 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:12:00.835 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:12:00.838 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:12:01.099 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 02:12:01.100 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 02:12:01.101 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 02:12:01.104 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 02:12:01.105 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 02:12:01.105 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:12:01.107 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:12:01.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 02:12:01.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 02:12:01.109 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 02:12:01.109 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:01.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:01.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:01.111 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:01.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:01.124 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:01.126 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:12:01.132 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:cf:ee:a6:0f:89:30:64:bb:3c:55:98:cf:ef:a5:7b:8e:f0:62:0b] modulus: 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 public exponent: 10001 ] 2021-05-12 02:12:37.009 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 02:12:37.010 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 02:12:37.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-12 02:12:37.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:12:37.014 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-12 02:12:37.014 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:12:37.015 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 02:12:37.019 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 02:12:37.021 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 02:12:37.033 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 02:12:37.034 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:12:37.034 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:12:37.035 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:12:37.257 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 02:12:37.258 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 02:12:37.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 02:12:37.263 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 02:12:37.324 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 02:12:37.326 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:12:37.328 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:12:37.329 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 02:12:37.331 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 02:12:37.332 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 02:12:37.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:37.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:37.333 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:37.334 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:37.335 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:37.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:37.337 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:12:37.340 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:bb:2e:e1:ee:b7:91:26:d2:a3:b2:28:5f:e6:53:d9:9c:fc:29:22] modulus: 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 public exponent: 10001 ] 2021-05-12 02:16:23.338 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 02:16:23.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 02:16:23.342 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-12 02:16:23.343 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:16:23.343 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-12 02:16:23.344 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:16:23.344 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 02:16:23.345 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 02:16:23.345 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 02:16:23.352 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 02:16:23.353 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:16:23.353 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:16:23.355 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:16:23.548 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 02:16:23.549 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 02:16:23.549 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 02:16:23.556 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 02:16:23.558 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 02:16:23.558 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:16:23.560 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:16:23.561 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 02:16:23.561 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 02:16:23.562 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 02:16:23.562 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:16:23.563 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:16:23.563 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:16:23.564 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:16:23.565 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:16:23.566 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:16:23.567 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:16:23.629 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:fb:38:10:5e:4e:b6:52:70:1d:b8:a8:fe:fa:64:85:5e:b6:d6:d8] modulus: b4cedbd52e0bb529b2aae6d83c89293cd2b4823159e72cfb32cbbc52b62db0e97dea279a232e52015d28e9cb59dc22de08a9f245ca9dbde54bceef69965e7ee1278d4ed13c7002fd45817c9abf2f5bdc197e9c3e3d95b85f964aacbff8f88cc6f0e196af871ca6e3d963cbf4b30daf33d82da004f74b01af365f662d0bc44d36ad56a1739a3938db11d435fd616680681e7579d936950ab173696c24446231412c4c74ba2c2229937c555a235bf617cd02cac2cd88d11d5cbcba61bfbe31973b031b3cf41538616b066fd94a2ec70fe8f587d05b97be3d42d04c2084df0a2a3e6d46e783090bfbfa1f4231ab0d7f4d103aac4827c6e5057f9fc1ac230213d49b public exponent: 10001 ] 2021-05-12 02:20:20.721 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 02:20:20.722 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 02:20:20.724 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-12 02:20:20.725 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:20:20.725 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-12 02:20:20.726 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:20:20.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 02:20:20.727 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 02:20:20.728 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 02:20:20.734 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 02:20:20.735 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:20:20.735 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:20:20.737 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:20:20.922 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 02:20:20.923 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 02:20:20.923 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 02:20:20.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 02:20:20.926 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 02:20:20.926 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:20:20.928 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:20:20.928 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 02:20:20.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 02:20:20.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 02:20:20.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:20:20.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:20:20.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:20:20.931 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:20:20.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:20:20.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:20:20.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:20:20.937 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:1c:e2:da:dc:a3:d3:c6:75:bc:9e:cf:17:9c:37:85:0d:bd:83:67] modulus: 90d1a41b27a56e7304bcd68dda14c332598c3ad9895ae9f795897f998a8a58a4fda4dd9444ea091d459dfaf23ff4ebb1ecaaf705bf791ba68cf1a7fb982dbe49ba1765b206505eff639ed3ea9004005f42b0a32754214b24d4e59a35ae48253922cb0ade32f6c336ac0c671ff3443f648d81c41bbb1b579b799ccb5aee98fc2ec0ea2c159397d8878d1a311031c6c63622390602859060bfaa46d324115c311a2269de3f4a02dae1e25cb070fb55cde086cce76697030ac682d59cb039cc2a7939b8032a206fafb0608e087e83ba01f394fb70fb753fdf05f1ba3f26aea53b69e4e1c7f9e783581769d3bfe7fcfc92b26dacce85f898f82ef80eece885288421 public exponent: 10001 ] 2021-05-12 02:23:52.128 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-05-12 02:23:52.130 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-05-12 02:23:52.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:23:52.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:23:52.134 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:23:52.137 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:23:52.138 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-05-12 02:23:52.138 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-05-12 02:23:52.139 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-05-12 02:23:52.144 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-05-12 02:23:52.144 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:23:52.145 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-05-12 02:23:52.146 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:23:52.337 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-05-12 02:23:52.337 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-05-12 02:23:52.338 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-05-12 02:23:52.339 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-05-12 02:23:52.340 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1311 2021-05-12 02:23:52.340 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:23:52.342 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:23:52.342 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-05-12 02:23:52.343 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-05-12 02:23:52.343 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-05-12 02:23:52.343 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:23:52.344 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:23:52.344 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:23:52.345 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:23:52.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:23:52.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:23:52.347 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:23:52.350 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: d0e344f93d186ad62aaa5168957c0d63f639420c063232e7602d5b52942008cb0395443e5c94eea002df6f5223ec85a34f1e436724c40507c254fba16981b025e08517e334fef1b0f486130dad5ea833470213ff752df4274c62d6ea9f7c1806ad4d821c838dd3a737fc4588c5c0e94067d3d9839a32ed9a927fabf188fde18142522c8bd34f4626b7cb71c4057a6f1b194bc69c55fedb2efeea98da42fb40640d18a7f2375f1cd6ede700d7764cd13a2616f80827cd2d0dd9718f7898d723e0dc265ec5858e16c32d9d43c30d57fcf54541711e4c86720ea07f48aae096e4366fb3a69b735aa913ab4e34ad3d80edc715fda955a777b7cd7ab09d6940614609f8c4fb97643b69a5f87f2a91e5f56577900a0727d035e2c486fa3c31681732fd06e29296968feae8698f1240926751dd846784bcb9652b6620914973a2a520b56b8ebe5204955f71116d082a2a943509bd609e64031a64cd78f034d3f62013d13b5308bea033b34db47137135ec05863ffe8539d1b46fb43033c924f109942d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:20:67:0a:11:f3:8f:05:a8:6d:bf:73:09:d5:6c:43:3e:35:c8:28] modulus: 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 public exponent: 10001 ]