By type
2021-11-12 02:45:49,066 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-12 02:45:53,575 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-12 02:45:56.866 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-12 02:46:10.165 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-12 02:46:11.764 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-12 02:46:12.476 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-12 02:46:23.982 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 37.111 seconds (JVM running for 44.89) 2021-11-12 02:47:06.274 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 02:47:06.368 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 02:47:06.565 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 02:47:06.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 02:47:06.579 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 02:47:06.581 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 02:47:06.582 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 02:47:06.663 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 02:47:06.664 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 02:47:06.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 02:47:06.677 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 02:47:06.679 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 02:47:06.965 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 02:47:06.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 02:47:06.972 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 02:47:06.976 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 02:47:08.672 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 02:47:08.675 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 02:47:08.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 02:47:08.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 02:47:08.763 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 02:47:08.765 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 02:47:08.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 02:47:08.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 02:47:08.769 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 02:47:08.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 02:47:08.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 02:47:08.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 02:47:08.867 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 02:47:08.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 02:47:08.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 02:47:08.870 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 02:47:08.974 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:d4:d4:70:52:0d:2a:49:8c:a8:5e:a6:2d:43:c1:2b:5e:05:d7:fc] modulus: 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 public exponent: 10001 ] 2021-11-12 04:40:14.582 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:40:14.662 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:40:14.667 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 04:40:14.669 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:40:14.670 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 04:40:14.671 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:40:14.672 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:40:14.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:40:14.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:40:14.759 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:40:14.865 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:40:14.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:40:14.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:40:14.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:40:15.078 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:40:15.080 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:40:15.081 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:40:15.081 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:40:15.087 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:40:15.087 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:40:15.088 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:40:15.088 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:40:15.088 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:40:15.089 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:40:15.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:40:15.090 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:40:15.160 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:40:15.161 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:40:15.162 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:40:15.165 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:40:15.171 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:8d:18:9e:73:f7:5e:b6:a4:ab:cb:3b:d2:e6:37:77:92:b3:2b:5a] modulus: aee8cf38f774fe537b396df366df3e6695d014f4e6c59281bc0f1a8f86c3816b4730d4bab91e88e8b87f998e38d13657c543b539d8f692bbba45aafca24fffa00dcb7b16251bc5accb7943af3faff247298ab256f3890b93f5cc6abc943527bea93341b8f5f639fca5f90fc71991d2ec7b592062e994365c5c3fd9c396f83f1f231b71f6a9235c289c457a0d8c69af5b45311c766f7c9d029ffc465c253497fccdb984157054701aba88ebba2a90b14684dccd06a4b550a60d4e51d9efd62e435d5065f9b8a4270e7e0aeb62c93683e38208a328eacaf08665edd3138f5d3c12d996c90d43cf9230ebf594b4fdc345c87cdbd62bd67fc30137f063cac21335bf public exponent: 10001 ] 2021-11-12 04:41:37.778 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:41:37.779 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:41:37.780 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:41:37.781 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:41:37.782 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:41:37.782 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:41:37.782 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:41:37.783 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:41:37.783 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:41:37.783 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:41:37.787 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:41:37.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:41:37.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:41:37.788 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:41:37.947 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:41:37.948 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:41:37.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:41:37.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:41:37.959 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:41:37.960 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:41:37.961 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:41:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:41:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:41:37.963 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:41:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:41:37.965 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:41:37.966 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:41:37.967 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:41:37.968 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:41:37.969 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:41:37.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:c7:f0:0a:c2:03:c7:0b:dd:13:82:fe:9e:1e:cd:9e:c6:28:72:12] modulus: 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 public exponent: 10001 ] 2021-11-12 04:45:13.753 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:45:13.754 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:45:13.756 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:45:13.756 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:45:13.757 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:45:13.757 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:45:13.758 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:45:13.758 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:45:13.758 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:45:13.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:45:13.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:45:13.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:13.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:13.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:13.854 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:45:13.859 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:45:13.859 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:45:13.860 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:13.862 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:45:13.862 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:45:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:13.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:13.864 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:13.864 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:13.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:13.865 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:13.866 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:13.866 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:13.867 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:45:13.871 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:4d:0e:9c:e4:a8:00:2e:ae:62:ac:14:56:b8:e4:0e:4b:01:39:1b] modulus: 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 public exponent: 10001 ] 2021-11-12 04:45:14.100 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:45:14.100 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:45:14.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:45:14.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:45:14.102 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:45:14.103 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:45:14.103 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:45:14.104 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:45:14.104 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:45:14.104 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:45:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:45:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:14.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:14.212 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:45:14.212 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:45:14.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:45:14.213 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:14.262 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:45:14.263 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:45:14.263 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:14.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:14.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:14.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:14.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:14.266 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:14.267 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:14.267 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:14.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:14.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:45:14.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:ff:b0:2c:28:78:bd:e3:7c:36:eb:b4:f1:36:d2:c9:69:57:35:d1] modulus: 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 public exponent: 10001 ] 2021-11-12 04:45:43.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:45:43.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:45:43.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:45:43.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:45:43.532 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:45:43.533 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:45:43.533 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:45:43.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:45:43.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:45:43.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:45:43.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:45:43.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:43.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:45:43.542 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:43.620 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:45:43.621 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:45:43.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:45:43.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:45:43.660 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:45:43.660 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:45:43.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:43.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:43.662 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:43.663 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:43.663 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:43.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:43.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:45:43.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:45:43.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:45:43.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:45:43.670 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:d5:96:25:85:b4:28:f9:ca:65:83:99:d2:87:92:98:a2:f9:b4:69] modulus: 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 public exponent: 10001 ] 2021-11-12 04:46:16.751 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:46:16.751 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:46:16.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:46:16.753 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:46:16.753 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:46:16.754 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:46:16.754 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:46:16.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:46:16.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:46:16.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:46:16.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:46:16.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:46:16.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:46:16.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:46:16.849 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:46:16.850 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:46:16.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:46:16.859 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:46:16.860 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:46:16.861 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:46:16.861 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:46:16.862 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:46:16.862 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:46:16.862 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:46:16.863 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:46:16.863 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:46:16.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:46:16.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:46:16.864 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:46:16.865 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:46:16.868 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:79:e7:76:54:35:13:71:c1:6d:fb:cc:fe:57:be:cc:8e:39:2b:6a] modulus: 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 public exponent: 10001 ] 2021-11-12 04:48:03.671 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:48:03.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:48:03.674 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:48:03.675 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:48:03.676 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:48:03.676 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:48:03.677 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:48:03.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:48:03.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:48:03.678 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:48:03.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:48:03.681 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:48:03.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:48:03.682 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:48:03.765 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:48:03.766 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:48:03.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:48:03.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:48:03.769 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:48:03.770 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:48:03.770 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:03.771 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:03.771 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:03.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:03.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:03.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:03.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:03.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:03.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:03.774 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:48:03.778 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:c7:2f:25:55:44:5b:fa:cc:41:05:2b:0a:ad:4f:6e:3c:85:56:d7] modulus: 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 public exponent: 10001 ] 2021-11-12 04:48:57.451 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:48:57.454 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:48:57.457 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:48:57.458 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:48:57.458 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:48:57.458 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:48:57.459 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:48:57.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:48:57.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:48:57.459 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:48:57.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:48:57.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:48:57.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:48:57.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:48:57.568 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:48:57.569 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:48:57.570 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:48:57.571 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:48:57.572 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:48:57.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:48:57.574 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:57.574 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:57.575 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:57.575 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:57.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:57.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:57.577 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:48:57.578 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:48:57.578 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:48:57.579 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:48:57.582 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:16:8e:b1:39:f4:0f:c0:a4:81:0e:56:d3:d4:8a:cb:1e:e9:77:17] modulus: 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 public exponent: 10001 ] 2021-11-12 04:50:10.716 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:50:10.717 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:50:10.718 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:50:10.719 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:50:10.719 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:50:10.719 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:50:10.720 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:50:10.720 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:50:10.720 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:50:10.720 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:50:10.724 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:50:10.724 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:50:10.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:50:10.725 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:50:10.860 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:50:10.860 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:50:10.861 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:50:10.861 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:50:10.862 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:50:10.863 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:50:10.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:10.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:10.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:10.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:10.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:10.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:10.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:10.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:10.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:10.867 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:50:10.869 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:0b:5a:0a:90:6d:a9:c3:b4:fc:9f:ff:ea:f6:63:14:7d:97:59:14] modulus: af7911d8b56e05bcd602003555569acf3ed535e78e0823434b58b744f99c4726b69c9538b6e4e6ac57a2a436adf2d49bdf7af1cc975c9a5ef941ee641473c4367b8ae2659c2666888bfbee71fed8e703709171e23665e96fbeec9eea903ec0385f5e6699aa439c2488e9f63e64f587aaa761c2c09d43c43100c3df291d7420326050bfa77f05bce5e7157ef8b0ee64f4fd83550806c80fbda744a04cde0ed2d17efc2f509b16eb0ecb608a602ded96abc39fa0374b65d8c2abcb4480d5fd1aaf23ad3cf2e3347fe13f80f1b53f2cdeb2f74ed2473ec9f51da9c6bd60321b9f6f6b2013988a764bdc86976225b6a0867672b10320396d9eefa373d157578b922f public exponent: 10001 ] 2021-11-12 04:50:46.380 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:50:46.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:50:46.382 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:50:46.383 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:50:46.383 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:50:46.383 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:50:46.383 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:50:46.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:50:46.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:50:46.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:50:46.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:50:46.389 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:50:46.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:50:46.390 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:50:46.551 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:50:46.551 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:50:46.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:50:46.552 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:50:46.553 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:50:46.554 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:50:46.554 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:46.554 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:46.555 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:46.555 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:46.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:46.556 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:46.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:50:46.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:50:46.557 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:50:46.558 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:50:46.561 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:a4:3b:69:4e:eb:14:38:a5:b6:f3:cf:cf:9a:a6:da:44:26:72:7c] modulus: 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 public exponent: 10001 ] 2021-11-12 04:51:54.587 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:51:54.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:51:54.589 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:51:54.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:51:54.590 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:51:54.591 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:51:54.591 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:51:54.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:51:54.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:51:54.591 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:51:54.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:51:54.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:51:54.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:51:54.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:51:54.671 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:51:54.672 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:51:54.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:51:54.672 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:51:54.674 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:51:54.674 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:51:54.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:51:54.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:51:54.675 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:51:54.676 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:51:54.676 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:51:54.677 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:51:54.677 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:51:54.678 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:51:54.678 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:51:54.679 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:51:54.682 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:01:c5:8d:3c:36:db:76:b1:b1:35:ac:71:9c:da:f6:4d:3f:08:b4] modulus: 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 public exponent: 10001 ] 2021-11-12 04:54:25.934 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:54:25.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:54:25.937 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:54:25.938 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:54:25.939 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:54:25.939 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:54:25.940 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:54:25.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:54:25.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:54:25.941 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:54:25.944 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:54:25.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:54:25.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:54:25.945 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:54:26.033 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:54:26.033 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:54:26.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:54:26.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:54:26.036 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:54:26.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:54:26.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:54:26.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:54:26.038 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:54:26.038 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:54:26.039 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:54:26.039 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:54:26.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:54:26.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:54:26.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:54:26.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:54:26.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:70:3a:67:68:99:1e:fa:8d:52:d7:c3:d0:b6:cc:8b:8a:61:68:6b] modulus: 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 public exponent: 10001 ] 2021-11-12 04:55:38.952 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:55:38.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:55:38.955 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:55:38.956 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:55:38.956 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:55:38.957 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:55:38.957 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:55:38.958 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:55:38.958 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:55:38.958 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:55:38.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:55:38.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:55:38.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:55:38.966 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:55:39.040 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:55:39.041 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:55:39.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:55:39.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:55:39.043 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:55:39.044 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:55:39.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:55:39.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:55:39.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:55:39.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:55:39.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:55:39.046 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:55:39.046 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:55:39.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:55:39.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:55:39.048 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:55:39.060 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:e3:b7:f3:3e:6f:4a:75:06:95:b2:5d:6c:b1:c9:75:15:80:73:43] modulus: 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 public exponent: 10001 ] 2021-11-12 04:57:42.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:57:42.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:57:42.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:57:42.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:57:42.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:57:42.788 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:57:42.789 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:57:42.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:57:42.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:57:42.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:57:42.795 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:57:42.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:57:42.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:57:42.796 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:57:42.884 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:57:42.885 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:57:42.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:57:42.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:57:42.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:57:42.889 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:57:42.889 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:57:42.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:57:42.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:57:42.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:57:42.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:57:42.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:57:42.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:57:42.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:57:42.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:57:42.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:57:42.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: b8494f40de6334c7815d35209daf421395a8dc1f03193e0c8c9c9c4b3cffbc770169c7eae99cfd1c2d37c5ab6d552d1743b2a9c53977f82c0067ad692049e51366cdc225cdf5520525fc94ab6bdc86b0b4bc87f0a7cc11043e6fc99bbf02d233b71d4dfa78a45f4e3735180b93ec564a8e5e662e8e6cffbddacd7488e518c4c385b94915b8ff11ea1c59b3cdbab2b6d6589387d3892f2e0cd3d9a8ec51dc1906831a7cb7cc77f554c8dd8d40e377b9451a8bdc1973cc761ac3f84f78ecb75ba77c5d51c5f51545f4098a882aaa1b3f5597978550a2ca1a96a1ddb65ec161525f4bb752a41132ef868d2c523de7dd460cd45fa7a9b0772a276ee676cfe7a405d1714ea8753232722d3961050d6d63eab1f80bf2bd1822e03cdc8e33cc8dc49e2e73ec11d09f15dcf86df76ef9dfc68af155714cb544a5acbc2e75be7a6c7e802e7fc1d90b0d229f82274aa906ee18d579ca2eccaaaf2a9885e192ccc87db13601e1c409339cafb754c960902ec4dfc6a721cab44d1b6147fbb88f6fd9e0e0ae91 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:ec:c3:f5:4d:6b:6e:e0:84:9b:03:b6:ea:0f:82:85:bd:89:76:7e] modulus: adad6729c279de5723475ee283d1cbe0744652c97617555fcdc83f400714af1776e1eb9f91aee4a31293e83565154c89ae8e395dd99c963839db2dac46f7ead287750cb023a7cfc8ae4ea27bc5976ca9fd8c5e8b8820a817f16ea3e253e0fb5436ad9871d092477c156b46e620ec5f1f31fbbf444130e2829a2927e41ec307004658a8a6b0210b1255d281408da0c279ac03cd16b24b3ce1f4031c2ed3cb2c5aaca50c5944503396b961401b7113b4c27f2848670e7cb242c8cbd2e251f851cee7958bb53fea73809af5cac074a534c3e996302debc4efed93d84ffc96f073e2e3513d5721d9fad05668fc00ef7d578b7f5ef48bdc9f98df027a5f792ee86055 public exponent: 10001 ] 2021-11-12 04:59:44.561 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 04:59:44.562 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 04:59:44.563 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 04:59:44.565 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:59:44.566 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 04:59:44.567 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 04:59:44.567 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 04:59:44.568 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 04:59:44.568 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 04:59:44.569 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 04:59:44.575 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 04:59:44.575 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:59:44.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 04:59:44.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:59:44.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 04:59:44.666 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 04:59:44.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 04:59:44.666 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:59:44.667 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 04:59:44.667 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 04:59:44.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:59:44.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:59:44.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:59:44.668 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:59:44.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:59:44.669 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:59:44.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:59:44.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:59:44.670 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:59:44.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:59:44.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:78:5b:72:ac:14:39:2b:b3:0e:c4:e0:39:d6:ee:14:d6:05:49:bc] modulus: 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 public exponent: 10001 ] 2021-11-12 05:04:08.678 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 05:04:08.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 05:04:08.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 05:04:08.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 05:04:08.681 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 05:04:08.681 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 05:04:08.681 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 05:04:08.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 05:04:08.681 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 05:04:08.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 05:04:08.685 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 05:04:08.685 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:04:08.686 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:04:08.686 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:04:08.795 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 05:04:08.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 05:04:08.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 05:04:08.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:04:08.798 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 05:04:08.799 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 05:04:08.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:04:08.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:04:08.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:04:08.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:04:08.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:04:08.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:04:08.802 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:04:08.802 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:04:08.802 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:04:08.803 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 05:04:08.806 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:e6:ef:27:ca:7e:09:ac:7d:ee:64:75:df:2b:22:f5:fb:cd:a5:72] modulus: be78b3384f82cc25b0999c53e3d957968f6c9599ea28eb5882dd1d5138308c3e5c3b21419c88e29c00958946777768a66ff12166f50ee28db84b7f7df4662ec55edc4532416e4738cafa198f8018db9bd5298ae6df408005320034df4d5637425e818c121573f29ae005ae073718eedfde179cf765eb59ac332d194f6b0dc855514b2226a600a7bac227053e8e77622c067d7cf79f6db72f6c625bcee5f32110778943c7b24557f7b0907f1415d3fe3789cb73b09dca83ef8b878249cc6ad24e1f7933de5f1e45979e6c3c2803b1bcbeba35908f8cf16b4cd09125241ddfb0117e17c61e82afb5409714307640f8c02d4191eaf334d915d7c61058845a67556d public exponent: 10001 ] 2021-11-12 05:08:15.690 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 05:08:15.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 05:08:15.692 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 05:08:15.692 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 05:08:15.692 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 05:08:15.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 05:08:15.693 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 05:08:15.693 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 05:08:15.693 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 05:08:15.694 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 05:08:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 05:08:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:08:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:08:15.700 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:08:15.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 05:08:15.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 05:08:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 05:08:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:08:15.851 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 05:08:15.852 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 05:08:15.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:15.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:15.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:15.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:15.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:15.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:15.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:15.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:15.855 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:15.856 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 05:08:15.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:12:78:16:5b:ce:95:d6:23:d6:68:2b:fa:28:5f:f3:03:b2:e3:e5] modulus: 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 public exponent: 10001 ] 2021-11-12 05:08:47.309 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 05:08:47.310 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 05:08:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 05:08:47.311 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 05:08:47.311 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 05:08:47.312 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 05:08:47.312 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 05:08:47.312 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 05:08:47.312 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 05:08:47.312 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 05:08:47.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 05:08:47.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:08:47.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:08:47.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:08:47.397 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 05:08:47.398 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 05:08:47.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 05:08:47.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:08:47.401 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 05:08:47.401 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 05:08:47.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:47.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:47.402 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:47.403 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:47.403 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:47.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:47.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:08:47.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:08:47.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:08:47.406 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 05:08:47.410 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:7c:6e:62:8f:18:bf:e2:f5:ad:28:9e:2a:43:53:3e:95:b9:a7:af] modulus: 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 public exponent: 10001 ] 2021-11-12 05:09:20.425 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-12 05:09:20.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-12 05:09:20.426 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 05:09:20.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 05:09:20.427 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 05:09:20.427 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-12 05:09:20.427 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-12 05:09:20.428 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-12 05:09:20.428 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-12 05:09:20.428 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-12 05:09:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-12 05:09:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:09:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-12 05:09:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:09:20.529 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-12 05:09:20.530 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-12 05:09:20.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-12 05:09:20.530 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 05:09:20.532 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-12 05:09:20.533 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-12 05:09:20.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:09:20.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:09:20.533 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:09:20.534 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:09:20.534 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:09:20.534 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:09:20.535 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 05:09:20.535 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-12 05:09:20.535 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-12 05:09:20.536 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 05:09:20.539 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 594289858529061266823328401014001425985448310574 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 02:40:57 UTC 2021 Final Date: Wed Nov 12 02:40:56 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:52:d8:04:df:1a:fd:39:92:03:cb:f1:f3:c4:a7:58:ff:39:60:3a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad0e41e21f59797bea14665d21701cc93b6ef27 4a90e08f0e43eb18c24205f76b5dc9a3e5aac0bb 6e351e2be5f4e9ea27fd7f7e85e9840122b239c0 e0eb0fcbdb7a852d7047d734f2fc2d460fbe8654 eae6c368bed9dc46b02b9a55f5d906ebd26819d7 e87e6feaaa4f9ee3d66cd6b1771fe261049e1bfb c9e28a296347d5e0836cd4c3139e57f813a5fd77 01c89ce12329749ca4b68b2a067d518bed9368c0 3f1fff9f963670da3cc5b37e3de3a715eb8e5e64 6e21750ed5e4c92f2d9c08317f3496ccf86b7a13 d4fa45e83e774fb142b7e004c1c106b44ab064a1 067f0746bf222dea4f87c7932433ba58f54eee88 5d204304cbb7626e7eefc9be4c5743c74fb3f001 77e81e56ba7da4f0aae22f9bb002cbd28e8d705b 24fd50d13528b4a6b037d2d157c800d1291fc322 7ab933c8e8285f82c36e10146b4a74a6b3d44b1e 9176d431795d8c771b2904d5674120b956e39e6a 3fc7ba6240b5697b7d6e1e4fcd9e817ea58201b7 a782e1f8bafeef015b3596d6818e8ec64559e9c6 c9f9d745 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:dd:0e:8f:d5:8a:71:2e:5b:02:79:d0:36:a8:5f:e0:44:a4:82:c7] modulus: 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 public exponent: 10001 ]