By type
2021-06-10 23:28:45,324 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-06-10 23:28:49,508 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-06-10 23:28:52.811 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-06-10 23:29:05.614 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-06-10 23:29:06.629 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-06-10 23:29:07.424 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-06-10 23:29:22.413 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.591 seconds (JVM running for 47.08) 2021-06-10 23:39:15.417 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-10 23:39:15.516 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-10 23:39:15.617 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-06-10 23:39:15.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 23:39:15.722 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-06-10 23:39:15.810 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 23:39:15.817 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-10 23:39:15.818 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-10 23:39:15.819 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-10 23:39:15.828 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-10 23:39:15.831 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-10 23:39:16.021 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-10 23:39:16.028 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-10 23:39:16.107 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-10 23:39:16.127 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 23:39:17.424 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-10 23:39:17.427 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-10 23:39:17.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-10 23:39:17.511 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-10 23:39:17.514 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-10 23:39:17.515 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-10 23:39:17.521 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 23:39:17.522 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-10 23:39:17.608 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-10 23:39:17.610 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-10 23:39:17.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 23:39:17.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-10 23:39:17.612 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-10 23:39:17.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 23:39:17.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-10 23:39:17.625 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-10 23:39:17.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 23:39:17.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:fb:40:66:3b:7f:9c:4d:ee:2a:96:82:be:f6:3a:54:d2:4a:00:de] modulus: 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 public exponent: 10001 ] 2021-06-11 01:13:23.175 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:13:23.182 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:13:23.209 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:13:23.214 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:13:23.215 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:13:23.216 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:13:23.217 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:13:23.224 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:13:23.227 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:13:23.311 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:13:23.313 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:13:23.313 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:13:23.318 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:13:23.508 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:13:23.509 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:13:23.510 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:13:23.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:13:23.516 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:13:23.517 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:13:23.523 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:13:23.524 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:13:23.524 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:13:23.525 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:13:23.525 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:13:23.525 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:13:23.526 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:13:23.527 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:13:23.527 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:13:23.528 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:13:23.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:13:23.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:8e:ca:a3:7a:bb:16:45:64:c8:eb:48:2e:27:ac:70:9a:60:3b:ab] modulus: 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 public exponent: 10001 ] 2021-06-11 01:15:10.013 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:15:10.014 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:15:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-11 01:15:10.015 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:15:10.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-11 01:15:10.016 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:15:10.017 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:15:10.017 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:15:10.018 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:15:10.022 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:15:10.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:15:10.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:15:10.024 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:15:10.127 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:15:10.128 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:15:10.128 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:15:10.131 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:15:10.132 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:15:10.132 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:15:10.135 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:15:10.136 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:15:10.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:15:10.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:15:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:15:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:15:10.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:15:10.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:15:10.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:15:10.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:15:10.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:15:10.214 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:15:de:6a:69:fd:9f:d7:a1:d4:8f:56:e3:16:e7:a1:f0:36:63:e3] modulus: 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 public exponent: 10001 ] 2021-06-11 01:18:34.069 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:18:34.071 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:18:34.072 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-11 01:18:34.073 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:18:34.073 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-11 01:18:34.074 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:18:34.074 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:18:34.074 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:18:34.075 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:18:34.083 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:18:34.084 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:18:34.108 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:18:34.110 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:18:34.199 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:18:34.208 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:18:34.208 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:18:34.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:18:34.216 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:18:34.216 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:18:34.217 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:18:34.218 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:18:34.218 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:18:34.218 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:18:34.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:18:34.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:18:34.219 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:18:34.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:18:34.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:18:34.220 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:18:34.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:18:34.224 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:77:15:bc:10:11:50:7b:c6:e9:6b:57:f5:f9:0a:6b:ad:52:ce:83] modulus: f227f5c5875083c727c4a16de40a45cd82ed2acb001c720f6acb97432309f5e6e26833b6658e27f1f018c41bfd6c0258d0981010d1950890528c3df66a3cba48ea271f1f03d0cfbc9a20c2f78e09be4fc0cb7a38775ac201bafb2c5bfb00872d34ae4ae968960925db61637da3150aa207c3a073e995b47b3951348ac0a61d604a0d69e86607e88d27770a8f4d3ae6d655d1a767b3cb7f6ec2bdd1cb34cbe02a031940c9372055e14a260e5134998a3b9809bfde42c2c30cc3ee98c23bbcb4eebe5a79f6aaf29bb4116c1a929bec00dc6c19b42237aeacea21bccd8ccebb27e1208ce813ddaf0f36dfea8d22d29864f8407507811d0c8ddab6f39f37a6710731 public exponent: 10001 ] 2021-06-11 01:18:44.731 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:18:44.732 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:18:44.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-11 01:18:44.734 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:18:44.734 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-11 01:18:44.735 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:18:44.735 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:18:44.736 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:18:44.736 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:18:44.740 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:18:44.740 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:18:44.741 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:18:44.742 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:18:44.897 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:18:44.898 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:18:44.898 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:18:44.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:18:44.909 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:18:44.910 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:18:44.911 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:18:44.912 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:18:44.912 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:18:44.912 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:18:44.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:18:44.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:18:44.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:18:44.914 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:18:44.914 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:18:44.914 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:18:44.915 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:18:44.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:e5:69:13:65:c6:be:7f:c6:d2:17:93:b4:b4:03:87:b3:ea:e8:fa] modulus: 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 public exponent: 10001 ] 2021-06-11 01:19:01.878 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:19:01.879 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:19:01.880 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-11 01:19:01.881 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:19:01.881 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-11 01:19:01.882 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:19:01.882 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:19:01.883 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:19:01.883 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:19:01.888 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:19:01.888 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:19:01.888 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:19:01.890 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:19:01.970 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:19:01.971 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:19:01.971 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:19:02.008 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:19:02.009 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:19:02.010 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:19:02.011 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:19:02.012 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:19:02.012 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:19:02.013 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:19:02.013 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:19:02.013 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:19:02.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:19:02.014 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:19:02.015 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:19:02.015 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:19:02.016 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:19:02.020 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:fc:77:ba:e0:d4:30:f7:81:9b:0d:74:70:bd:9a:d2:7a:b2:9b:b9] modulus: 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 public exponent: 10001 ] 2021-06-11 01:19:06.636 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:19:06.638 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:19:06.639 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-11 01:19:06.640 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:19:06.640 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-11 01:19:06.641 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:19:06.641 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:19:06.641 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:19:06.642 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:19:06.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:19:06.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:19:06.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:19:06.648 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:19:06.808 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:19:06.809 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:19:06.809 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:19:06.811 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:19:06.812 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:19:06.812 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:19:06.815 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:19:06.815 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:19:06.815 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:19:06.816 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:19:06.816 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:19:06.816 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:19:06.816 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:19:06.817 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:19:06.817 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:19:06.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:19:06.818 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:19:06.820 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:38:39:b2:37:a6:d0:a1:74:75:50:46:79:47:de:ea:3c:0a:67:73] modulus: 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 public exponent: 10001 ] 2021-06-11 01:20:53.637 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:20:53.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:20:53.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-11 01:20:53.640 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:20:53.640 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-11 01:20:53.641 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:20:53.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:20:53.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:20:53.642 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:20:53.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:20:53.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:20:53.647 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:20:53.649 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:20:53.731 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:20:53.732 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:20:53.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:20:53.734 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:20:53.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:20:53.735 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:20:53.737 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:20:53.738 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:20:53.739 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:20:53.739 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:20:53.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:20:53.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:20:53.740 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:20:53.741 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:20:53.741 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:20:53.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:20:53.742 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:20:53.746 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:f4:62:6c:e0:b6:2e:ba:24:70:bb:92:a4:49:d2:df:67:cb:2d:09] modulus: 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 public exponent: 10001 ] 2021-06-11 01:21:31.163 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:21:31.165 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:21:31.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-11 01:21:31.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:21:31.167 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-11 01:21:31.167 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:21:31.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:21:31.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:21:31.169 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:21:31.173 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:21:31.174 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:21:31.174 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:21:31.176 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:21:31.260 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:21:31.309 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:21:31.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:21:31.311 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:21:31.312 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:21:31.312 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:21:31.314 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:21:31.315 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:21:31.315 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:21:31.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:21:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:21:31.316 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:21:31.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:21:31.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:21:31.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:21:31.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:21:31.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:21:31.321 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:2d:74:72:05:23:b1:90:ad:8e:2f:b6:0e:2f:31:35:fd:82:b2:33] modulus: 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 public exponent: 10001 ] 2021-06-11 01:26:15.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:26:15.849 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:26:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:26:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:26:15.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:26:15.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:26:15.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:26:15.852 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:26:15.852 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:26:15.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:26:15.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:26:15.858 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:26:15.860 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:26:16.008 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:26:16.009 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:26:16.009 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:26:16.010 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:26:16.011 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:26:16.011 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:26:16.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:26:16.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:26:16.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:26:16.013 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:26:16.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:26:16.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:26:16.014 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:26:16.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:26:16.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:26:16.015 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:26:16.016 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:26:16.018 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:b6:c2:ce:8c:7b:e5:35:4b:4d:bd:ba:0e:2e:d4:af:5d:22:e8:34] modulus: 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 public exponent: 10001 ] 2021-06-11 01:28:52.473 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:28:52.473 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:28:52.474 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:28:52.475 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:28:52.475 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:28:52.476 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:28:52.476 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:28:52.476 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:28:52.477 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:28:52.481 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:28:52.482 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:28:52.483 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:28:52.484 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:28:52.564 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:28:52.565 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:28:52.565 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:28:52.566 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:28:52.566 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:28:52.566 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:28:52.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:28:52.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:28:52.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:28:52.568 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:28:52.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:28:52.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:28:52.569 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:28:52.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:28:52.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:28:52.570 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:28:52.571 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:28:52.573 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:ba:15:62:43:fd:b8:8d:83:9f:60:11:99:ba:da:f7:34:29:0a:d2] modulus: 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 public exponent: 10001 ] 2021-06-11 01:30:59.381 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:30:59.382 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:30:59.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:30:59.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:30:59.385 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:30:59.386 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:30:59.386 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:30:59.386 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:30:59.387 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:30:59.392 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:30:59.393 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:30:59.393 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:30:59.394 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:30:59.482 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:30:59.483 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:30:59.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:30:59.485 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:30:59.485 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:30:59.486 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:30:59.487 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:30:59.488 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:30:59.488 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:30:59.488 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:30:59.488 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:30:59.489 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:30:59.489 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:30:59.489 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:30:59.490 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:30:59.490 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:30:59.491 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:30:59.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:16:8b:a2:df:83:5d:f2:37:6a:61:e8:46:3d:34:79:86:29:a4:74] modulus: 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 public exponent: 10001 ] 2021-06-11 01:32:36.063 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate signing request for CA named: RA 2021-06-11 01:32:36.064 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-06-11 01:32:36.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:32:36.065 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-11 01:32:36.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.CertificationModelFactory [m : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-11 01:32:36.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-11 01:32:36.067 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-06-11 01:32:36.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-06-11 01:32:36.068 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-06-11 01:32:36.072 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-06-11 01:32:36.072 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:32:36.072 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-06-11 01:32:36.073 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-06-11 01:32:36.158 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-06-11 01:32:36.158 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type: 1 2021-06-11 01:32:36.158 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying signature of the response. 2021-06-11 01:32:36.160 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying PasswordBased Protection of the Response. 2021-06-11 01:32:36.160 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Iteration count is: 1790 2021-06-11 01:32:36.161 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : One Way Function type is: 1.3.14.3.2.26 2021-06-11 01:32:36.162 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-11 01:32:36.163 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseValidationHelper [m : Implicit Confirm on certificate from server. 2021-06-11 01:32:36.163 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Response status code: 0 2021-06-11 01:32:36.164 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-06-11 01:32:36.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:32:36.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:32:36.164 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:32:36.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-11 01:32:36.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-06-11 01:32:36.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-06-11 01:32:36.167 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-11 01:32:36.170 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 43196641378737765190877743851558611857862293666 IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 10 23:22:58 UTC 2021 Final Date: Tue Jun 10 23:22:58 UTC 2031 SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696 d150f02af14251214c92b91d9a3ee1b03b847672 4703a843d9ac0848bf84cc5ae5f899853f5028d7 92f983fa1215408c9da510ea69e507fe8fe97963 41b741bd5cafbb5af3004a53326757fc9f2e40bc f353bf3563bdc32f8c78f944c7282a8652b2f6f3 73b2f97dae962f8acbdafb7b2a9d574845ca01c3 c385067c88591e7dfbfff9a450ae88665708f481 6a733d1cc426c96eddbe70e63435363dd83a577a 3d76951a682d870efa1ee98ba9377a2067bb1101 fb55531558ef9535d703e29f0cf21398262cfb5d c713257eb05513e39d1a92c628b2e637b5ee4957 968c80f67c938ff7ac4f3fe86d986b5f62b544d3 1da93e391dc5a1a46a94475d4f48dabc5ab4ce79 7034efdc8e6414e6e0db734bc0d692c6b33838c2 a42ebaeea6826f019b8f546b82f7bd676376f1dc c055e264e973189c1c6f0ccc4cc996b4095c7c39 d25565e5fe495e8754e7e7e877c80c2903f442c1 cf1ee16a0d1346a0962f00adc0f93b8fb3e489df f4c5aa88 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:9f:f6:8d:ee:e4:b7:23:7b:12:bb:29:e8:35:84:f8:ef:21:04:8a] modulus: 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 public exponent: 10001 ]