By type
2021-11-06 02:57:49,567 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-06 02:57:53,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-06 02:57:55.668 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-06 02:58:07.365 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-06 02:58:08.576 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-06 02:58:09.171 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-06 02:58:18.885 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 31.301 seconds (JVM running for 37.463) 2021-11-06 02:59:51.070 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 02:59:51.080 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 02:59:51.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-06 02:59:51.274 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 02:59:51.364 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-06 02:59:51.367 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 02:59:51.368 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 02:59:51.370 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 02:59:51.371 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 02:59:51.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 02:59:51.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 02:59:51.385 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 02:59:51.574 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 02:59:51.579 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 02:59:51.580 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 02:59:51.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 02:59:52.804 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 02:59:52.807 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 02:59:52.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 02:59:52.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 02:59:52.817 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 02:59:52.818 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 02:59:52.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.819 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.820 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.867 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.868 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.869 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.874 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.877 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 02:59:52.985 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: ceb6db9e4419c0263f4c93bd5941eb46a15ea17dc6e91ac768d1a0635b22ea51a6fff3333c51ab222f1b4344be2d6ac732e3f412db862008ed364f00bd51305db2db05fc4eead647d580957f98b5408e5b30ff87757369dbf9933a369d001cbde6e1b911f33342671503674e4de0f9c1264a2a0ba9a273817a10940fffb18359bc5ee31a21aab7ab2334656d6e7611a3b06865bd96d756fa7c998cbe9949619dcb72f6117c65d22636096d253937dcc46c174e0fc7e6b857fd4bfcb5967b9b0abd71589f2216fbfb3f4d145f8284cc56025fe94cc5550927b4527d6d07c32a72837de206652480ff496179fd963e57f015f8a73d3f82c8ec39cb81fe164089fc05e364e910d333ff3f69745d749d4802dba160cb3931f69d91591ace5a1615dfc0bcd8d6a53e8b7c9c6306cda7c57c5a2e64044ed80189274fab89362dd0c0b8197429bec65bab1c52f5cc5b05a007c85dfd230be92d544d4621ffcb9ca38240284050ae4f38abb1ad5245829140e2e6d3b4040e79dd4aa4e8fea54f80795f59 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:11:24:cb:3c:c5:2b:fd:93:bb:8a:4d:68:5d:36:a7:64:ef:09:84] modulus: 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 public exponent: 10001 ] 2021-11-06 07:03:29.537 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:03:29.539 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:03:29.542 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:03:29.563 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:03:29.565 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:03:29.566 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:03:29.566 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:03:29.567 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:03:29.567 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:03:29.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:03:29.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:03:29.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:03:29.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:03:29.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:03:29.882 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:03:29.883 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:03:29.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:03:29.883 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:03:29.886 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:03:29.887 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:03:29.887 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.888 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.892 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:03:29.897 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:7f:13:66:ac:81:e7:c2:8e:37:f6:fb:a4:ee:e5:5d:31:c3:39:8d] modulus: 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 public exponent: 10001 ] 2021-11-06 07:07:04.614 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:07:04.615 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:07:04.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:07:04.618 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:07:04.619 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:07:04.619 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:07:04.620 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:07:04.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:07:04.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:07:04.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:07:04.664 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:07:04.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:07:04.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:07:04.667 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:04.796 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:07:04.797 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:07:04.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:07:04.798 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:04.800 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:07:04.801 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:07:04.801 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.802 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.803 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.804 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.805 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.805 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.806 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:07:04.867 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:81:05:43:e4:da:3e:6e:94:40:8b:c0:d7:e8:ca:b2:7f:ca:9d:39] modulus: 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 public exponent: 10001 ] 2021-11-06 07:07:10.540 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:07:10.541 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:07:10.543 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-06 07:07:10.543 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:07:10.544 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-06 07:07:10.545 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:07:10.545 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:07:10.545 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:07:10.546 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:07:10.546 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:07:10.555 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:07:10.562 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:07:10.562 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:07:10.563 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:10.673 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:07:10.674 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:07:10.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:07:10.675 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:10.676 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:07:10.676 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:07:10.677 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.677 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.680 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.680 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.681 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.681 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:07:10.684 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:fa:af:7e:e4:80:2c:1a:f6:20:f0:56:bd:9a:45:f5:5b:60:c8:bb] modulus: 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 public exponent: 10001 ] 2021-11-06 07:09:18.608 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:09:18.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:09:18.610 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-06 07:09:18.611 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:09:18.611 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-06 07:09:18.612 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:09:18.612 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:09:18.613 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:09:18.613 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:09:18.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:09:18.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:09:18.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:09:18.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:09:18.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:09:18.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:09:18.763 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:09:18.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:09:18.764 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:09:18.766 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:09:18.767 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:09:18.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.769 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.770 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.771 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.772 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.772 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.774 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:09:18.779 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:22:5c:d2:22:2b:c5:7f:6c:f2:7d:3d:6c:73:3a:a4:98:e4:31:0e] modulus: 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 public exponent: 10001 ] 2021-11-06 07:11:54.131 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:11:54.133 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:11:54.134 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:11:54.135 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:11:54.135 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:11:54.136 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:11:54.136 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:11:54.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:11:54.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:11:54.138 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:11:54.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:11:54.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:11:54.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:11:54.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:11:54.240 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:11:54.240 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:11:54.240 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:11:54.241 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:11:54.262 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:11:54.263 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:11:54.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.264 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.264 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.264 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.265 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.265 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.266 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.267 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:11:54.269 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:40:1c:2a:17:29:e8:ad:b0:65:29:71:57:a9:86:4d:8a:1a:b4:96] modulus: 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 public exponent: 10001 ] 2021-11-06 07:12:25.482 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:12:25.483 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:12:25.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-06 07:12:25.485 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:12:25.485 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-06 07:12:25.486 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:12:25.486 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:12:25.487 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:12:25.487 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:12:25.488 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:12:25.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:12:25.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:12:25.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:12:25.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:25.637 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:12:25.663 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:12:25.664 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:12:25.664 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:25.666 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:12:25.666 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:12:25.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.670 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.671 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:12:25.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:42:c3:19:77:80:30:e5:b3:6b:0c:6c:c3:3b:51:73:b6:97:7d:48] modulus: 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 public exponent: 10001 ] 2021-11-06 07:12:58.128 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:12:58.129 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:12:58.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-06 07:12:58.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:12:58.132 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-06 07:12:58.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:12:58.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:12:58.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:12:58.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:12:58.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:12:58.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:12:58.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:12:58.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:12:58.141 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:58.232 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:12:58.233 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:12:58.233 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:12:58.233 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:58.264 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:12:58.264 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:12:58.264 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.265 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.265 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.266 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.266 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.266 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.267 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.267 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.267 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.268 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:12:58.271 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:69:60:76:54:78:90:04:2a:96:05:e5:af:a7:2b:af:a0:84:24:45] modulus: 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 public exponent: 10001 ] 2021-11-06 07:15:25.644 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-06 07:15:25.645 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-06 07:15:25.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:15:25.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:15:25.646 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:15:25.647 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-06 07:15:25.647 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-06 07:15:25.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-06 07:15:25.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-06 07:15:25.648 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-06 07:15:25.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-06 07:15:25.652 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:15:25.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-06 07:15:25.653 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:15:25.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-06 07:15:25.749 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-06 07:15:25.749 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-06 07:15:25.749 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:15:25.763 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-06 07:15:25.763 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-06 07:15:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.764 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.765 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.767 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:15:25.769 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:a6:3c:1d:6f:c9:55:94:7d:0f:ed:a7:6b:ab:46:02:6a:2d:e4:16] modulus: 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 public exponent: 10001 ]