By type
2021-11-14 10:13:30,546 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-14 10:13:34,849 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-14 10:13:37.752 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-14 10:13:50.654 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-14 10:13:51.864 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-14 10:13:52.371 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-14 10:14:02.847 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 34.177 seconds (JVM running for 40.222) 2021-11-14 10:14:39.865 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 10:14:39.952 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 10:14:40.063 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-14 10:14:40.066 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 10:14:40.151 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-14 10:14:40.155 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 10:14:40.156 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 10:14:40.244 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 10:14:40.245 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 10:14:40.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 10:14:40.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 10:14:40.264 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 10:14:40.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 10:14:40.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 10:14:40.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 10:14:40.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 10:14:41.864 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 10:14:41.868 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 10:14:41.868 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 10:14:41.870 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 10:14:41.878 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 10:14:41.879 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 10:14:41.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 10:14:41.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 10:14:41.943 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 10:14:41.956 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 10:14:41.957 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 10:14:41.957 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 10:14:41.963 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 10:14:41.964 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 10:14:42.044 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 10:14:42.046 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 10:14:42.072 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: c024285144ec2cb176ebc0263ddae7a703b12284ac03945102720cd46d0200a3775f056d1fda06b3036c063cb194b4e2c24e29ca9d72e4b5a45d6e4f33e01f7c340d98bc9ea5cbd1a25b7d81b8fe5991ef48b0ef4b0459aaf48ffe68205afd4347a125ba0d7f1c6f0a814e947c1076c1526606a9f25ca24e073762efe500a3aad95f25aebe7e91e8c25f329520bcc7603f0ce2c2abd5eab792bdc3e61c6ee774846ce77ae13cf4a73314befad1a5e13950f8fbefd712f3b0e14fd8ca2b718e8e95556484cc29fb6cdcb53d11fc116f7dae93c8006c30fd0cb1213ac25885c2cb84cd0842e2f1229954732cb504811fbdf08c2df3e560dfeb523024124ba96f6d57c1fb350212c83186402d85b5634ce887a461f67f6e0ee7a7e1949c7fd328699fcdc3dcfb652491b8eaadf77b27175cd72a3f4f8fca06f9ba34b2bb55d8aa4a159ba3e111532ad51db5f7bb9f760a0be459979c9c25f3ee31ad8b9a18d808b296fceecbdf037141e5133c516f167eea42b530b75e7ee41977cd38eece2de257 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:51:e8:8c:5a:50:ba:02:ca:ac:27:8e:51:11:c3:a8:3f:0d:2e:a4] modulus: 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 public exponent: 10001 ] 2021-11-14 12:01:57.070 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:01:57.072 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:01:57.075 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-14 12:01:57.076 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:01:57.076 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-14 12:01:57.077 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:01:57.144 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:01:57.144 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:01:57.145 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:01:57.145 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:01:57.152 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:01:57.154 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:01:57.154 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:01:57.154 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:01:57.744 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:01:57.744 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:01:57.745 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:01:57.745 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:01:57.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:01:57.749 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:01:57.749 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:01:57.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:01:57.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:01:57.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:01:57.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:01:57.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:01:57.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:01:57.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:01:57.753 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:01:57.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:01:57.845 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:1c:6a:de:da:62:0f:f6:68:1c:0c:d7:db:c8:44:c9:80:8e:34:6c] modulus: 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 public exponent: 10001 ] 2021-11-14 12:03:56.848 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:03:56.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:03:56.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:03:56.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:03:56.853 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:03:56.854 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:03:56.854 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:03:56.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:03:56.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:03:56.856 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:03:56.870 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:03:56.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:03:56.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:03:56.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:03:57.075 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:03:57.076 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:03:57.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:03:57.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:03:57.079 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:03:57.079 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:03:57.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:57.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:57.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:57.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:57.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:57.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:57.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:57.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:57.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:57.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:03:57.150 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:d4:22:66:e4:57:3f:33:6d:96:bb:1e:2f:96:b8:5d:c8:82:68:b9] modulus: bfdd854b8a46b2a39d7f1dd1faa03a16a8020e03b950c267c9640724b83f6ce7b13f08bfdd2d47ec538cc5e89d28b3b411b5fa1a284a12c875ef1e98b6151efcc1dfbec66e6b08ec118200ea25e76ceab14424889ddb963af4b6a97bad037969923f4074530a5bc94f29830726de2b7d27b76326e62b9f69c8a8634d581b0451ec5da7aa9b327631eda42abe339d0e51243cff7c6b82a6b1d9b0fc5a1bb4d98b78033f26367392741355692041e7b358e891b8a0882cb4aa72a0afc9eb3d5077418c0acf0aa4e0e4777d05157198aadff4cfdd93bd2a1e1794706c844f7345b63e36c61501d2b99e94ccebc1b01ea006508ae306ca67c8f0638bc7de5f51bed7 public exponent: 10001 ] 2021-11-14 12:03:58.632 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:03:58.633 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:03:58.634 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:03:58.635 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:03:58.635 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:03:58.636 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:03:58.636 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:03:58.636 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:03:58.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:03:58.637 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:03:58.642 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:03:58.643 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:03:58.643 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:03:58.643 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:03:59.004 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:03:59.004 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:03:59.005 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:03:59.005 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:03:59.007 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:03:59.007 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:03:59.007 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:59.008 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:59.008 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:59.009 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:59.009 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:59.009 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:59.010 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:03:59.010 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:03:59.011 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:03:59.011 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:03:59.014 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:d4:22:66:e4:57:3f:33:6d:96:bb:1e:2f:96:b8:5d:c8:82:68:b9] modulus: bfdd854b8a46b2a39d7f1dd1faa03a16a8020e03b950c267c9640724b83f6ce7b13f08bfdd2d47ec538cc5e89d28b3b411b5fa1a284a12c875ef1e98b6151efcc1dfbec66e6b08ec118200ea25e76ceab14424889ddb963af4b6a97bad037969923f4074530a5bc94f29830726de2b7d27b76326e62b9f69c8a8634d581b0451ec5da7aa9b327631eda42abe339d0e51243cff7c6b82a6b1d9b0fc5a1bb4d98b78033f26367392741355692041e7b358e891b8a0882cb4aa72a0afc9eb3d5077418c0acf0aa4e0e4777d05157198aadff4cfdd93bd2a1e1794706c844f7345b63e36c61501d2b99e94ccebc1b01ea006508ae306ca67c8f0638bc7de5f51bed7 public exponent: 10001 ] 2021-11-14 12:06:53.108 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:06:53.109 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:06:53.110 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:06:53.111 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:06:53.111 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:06:53.112 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:06:53.112 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:06:53.113 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:06:53.113 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:06:53.114 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:06:53.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:06:53.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:06:53.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:06:53.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:06:53.239 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:06:53.243 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:06:53.244 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:06:53.244 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:06:53.247 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:06:53.248 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:06:53.249 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:53.250 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:53.250 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:53.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:53.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:53.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:53.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:53.254 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:53.255 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:53.256 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:06:53.262 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: c024285144ec2cb176ebc0263ddae7a703b12284ac03945102720cd46d0200a3775f056d1fda06b3036c063cb194b4e2c24e29ca9d72e4b5a45d6e4f33e01f7c340d98bc9ea5cbd1a25b7d81b8fe5991ef48b0ef4b0459aaf48ffe68205afd4347a125ba0d7f1c6f0a814e947c1076c1526606a9f25ca24e073762efe500a3aad95f25aebe7e91e8c25f329520bcc7603f0ce2c2abd5eab792bdc3e61c6ee774846ce77ae13cf4a73314befad1a5e13950f8fbefd712f3b0e14fd8ca2b718e8e95556484cc29fb6cdcb53d11fc116f7dae93c8006c30fd0cb1213ac25885c2cb84cd0842e2f1229954732cb504811fbdf08c2df3e560dfeb523024124ba96f6d57c1fb350212c83186402d85b5634ce887a461f67f6e0ee7a7e1949c7fd328699fcdc3dcfb652491b8eaadf77b27175cd72a3f4f8fca06f9ba34b2bb55d8aa4a159ba3e111532ad51db5f7bb9f760a0be459979c9c25f3ee31ad8b9a18d808b296fceecbdf037141e5133c516f167eea42b530b75e7ee41977cd38eece2de257 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:51:4b:fa:8e:6b:3f:ac:02:7c:87:62:e0:a0:c8:28:ed:9b:3c:25] modulus: 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 public exponent: 10001 ] 2021-11-14 12:06:57.614 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:06:57.615 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:06:57.616 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:06:57.617 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:06:57.617 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:06:57.618 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:06:57.618 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:06:57.618 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:06:57.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:06:57.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:06:57.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:06:57.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:06:57.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:06:57.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:06:57.705 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:06:57.706 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:06:57.707 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:06:57.707 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:06:57.745 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:06:57.745 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:06:57.746 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:57.746 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:57.746 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:57.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:57.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:57.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:57.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:06:57.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:06:57.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:06:57.749 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:06:57.751 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: c024285144ec2cb176ebc0263ddae7a703b12284ac03945102720cd46d0200a3775f056d1fda06b3036c063cb194b4e2c24e29ca9d72e4b5a45d6e4f33e01f7c340d98bc9ea5cbd1a25b7d81b8fe5991ef48b0ef4b0459aaf48ffe68205afd4347a125ba0d7f1c6f0a814e947c1076c1526606a9f25ca24e073762efe500a3aad95f25aebe7e91e8c25f329520bcc7603f0ce2c2abd5eab792bdc3e61c6ee774846ce77ae13cf4a73314befad1a5e13950f8fbefd712f3b0e14fd8ca2b718e8e95556484cc29fb6cdcb53d11fc116f7dae93c8006c30fd0cb1213ac25885c2cb84cd0842e2f1229954732cb504811fbdf08c2df3e560dfeb523024124ba96f6d57c1fb350212c83186402d85b5634ce887a461f67f6e0ee7a7e1949c7fd328699fcdc3dcfb652491b8eaadf77b27175cd72a3f4f8fca06f9ba34b2bb55d8aa4a159ba3e111532ad51db5f7bb9f760a0be459979c9c25f3ee31ad8b9a18d808b296fceecbdf037141e5133c516f167eea42b530b75e7ee41977cd38eece2de257 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:2e:7d:56:0b:63:f3:aa:72:5b:22:57:53:ff:7d:da:aa:58:2b:e9] modulus: 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 public exponent: 10001 ] 2021-11-14 12:07:28.393 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:07:28.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:07:28.396 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-14 12:07:28.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:07:28.397 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-14 12:07:28.398 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:07:28.399 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:07:28.399 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:07:28.400 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:07:28.400 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:07:28.407 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:07:28.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:07:28.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:07:28.409 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:07:28.545 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:07:28.545 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:07:28.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:07:28.546 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:07:28.547 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:07:28.547 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:07:28.548 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:07:28.548 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:07:28.548 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:07:28.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:07:28.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:07:28.549 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:07:28.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:07:28.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:07:28.550 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:07:28.551 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:07:28.553 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:0e:91:42:8b:52:3b:de:8f:9e:99:94:10:77:56:0f:cc:3e:3e:53] modulus: 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 public exponent: 10001 ] 2021-11-14 12:08:01.847 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:08:01.848 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:08:01.856 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-14 12:08:01.857 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:08:01.857 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-14 12:08:01.857 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:08:01.858 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:08:01.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:08:01.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:08:01.858 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:08:01.862 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:08:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:08:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:08:01.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:08:02.032 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:08:02.033 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:08:02.033 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:08:02.033 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:08:02.035 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:08:02.035 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:08:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:08:02.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:08:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:08:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:08:02.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:08:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:08:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:08:02.037 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:08:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:08:02.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:08:02.043 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:39:83:0c:b8:c2:45:16:fe:3b:50:87:c4:46:f3:83:85:ab:d6:58] modulus: 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 public exponent: 10001 ] 2021-11-14 12:09:43.345 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:09:43.346 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:09:43.347 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:09:43.348 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:09:43.348 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:09:43.349 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:09:43.349 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:09:43.350 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:09:43.350 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:09:43.350 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:09:43.354 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:09:43.355 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:09:43.355 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:09:43.355 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:09:43.442 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:09:43.443 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:09:43.443 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:09:43.444 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:09:43.445 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:09:43.445 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:09:43.445 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:09:43.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:09:43.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:09:43.446 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:09:43.447 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:09:43.447 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:09:43.448 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:09:43.448 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:09:43.448 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:09:43.449 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:09:43.451 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:c0:99:f0:77:ce:86:39:e6:29:3b:e6:a0:47:1c:cc:79:70:17:53] modulus: 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 public exponent: 10001 ] 2021-11-14 12:10:04.722 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:10:04.723 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:10:04.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:10:04.725 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:10:04.725 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:10:04.726 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:10:04.726 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:10:04.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:10:04.726 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:10:04.727 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:10:04.731 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:10:04.731 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:10:04.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:10:04.732 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:10:04.832 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:10:04.833 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:10:04.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:10:04.834 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:10:04.835 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:10:04.836 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:10:04.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:10:04.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:10:04.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:10:04.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:10:04.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:10:04.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:10:04.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:10:04.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:10:04.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:10:04.844 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:10:04.847 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:56:25:86:63:96:b9:33:e5:23:58:09:36:3d:09:c1:f7:2e:61:df] modulus: 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 public exponent: 10001 ] 2021-11-14 12:13:58.323 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:13:58.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:13:58.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:13:58.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:13:58.327 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:13:58.327 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:13:58.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:13:58.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:13:58.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:13:58.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:13:58.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:13:58.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:13:58.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:13:58.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:13:58.435 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:13:58.436 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:13:58.437 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:13:58.437 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:13:58.438 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:13:58.438 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:13:58.439 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:13:58.439 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:13:58.439 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:13:58.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:13:58.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:13:58.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:13:58.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:13:58.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:13:58.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:13:58.442 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:13:58.445 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: c024285144ec2cb176ebc0263ddae7a703b12284ac03945102720cd46d0200a3775f056d1fda06b3036c063cb194b4e2c24e29ca9d72e4b5a45d6e4f33e01f7c340d98bc9ea5cbd1a25b7d81b8fe5991ef48b0ef4b0459aaf48ffe68205afd4347a125ba0d7f1c6f0a814e947c1076c1526606a9f25ca24e073762efe500a3aad95f25aebe7e91e8c25f329520bcc7603f0ce2c2abd5eab792bdc3e61c6ee774846ce77ae13cf4a73314befad1a5e13950f8fbefd712f3b0e14fd8ca2b718e8e95556484cc29fb6cdcb53d11fc116f7dae93c8006c30fd0cb1213ac25885c2cb84cd0842e2f1229954732cb504811fbdf08c2df3e560dfeb523024124ba96f6d57c1fb350212c83186402d85b5634ce887a461f67f6e0ee7a7e1949c7fd328699fcdc3dcfb652491b8eaadf77b27175cd72a3f4f8fca06f9ba34b2bb55d8aa4a159ba3e111532ad51db5f7bb9f760a0be459979c9c25f3ee31ad8b9a18d808b296fceecbdf037141e5133c516f167eea42b530b75e7ee41977cd38eece2de257 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:65:da:b5:16:37:b3:9e:e5:4d:22:13:88:42:50:ad:8d:d3:5f:ac] modulus: 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 public exponent: 10001 ] 2021-11-14 12:15:09.600 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:15:09.601 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:15:09.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:15:09.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:15:09.603 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:15:09.603 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:15:09.604 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:15:09.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:15:09.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:15:09.605 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:15:09.609 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:15:09.609 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:15:09.609 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:15:09.610 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:15:09.694 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:15:09.695 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:15:09.695 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:15:09.695 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:15:09.696 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:15:09.696 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:15:09.696 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:09.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:09.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:09.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:09.698 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:09.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:09.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:15:09.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:65:dd:6f:d6:39:27:e0:3a:53:a5:63:36:8e:7b:6d:04:70:eb:6f] modulus: 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 public exponent: 10001 ] 2021-11-14 12:15:38.850 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:15:38.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:15:38.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:15:38.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:15:38.853 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:15:38.854 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:15:38.855 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:15:38.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:15:38.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:15:38.856 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:15:38.860 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:15:38.860 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:15:38.860 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:15:38.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:15:38.927 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:15:38.943 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:15:38.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:15:38.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:15:38.945 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:15:38.945 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:15:38.946 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:38.946 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:38.946 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:38.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:38.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:38.947 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:38.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:15:38.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:15:38.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:15:38.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:15:38.951 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:5d:7e:b8:dd:86:7b:9c:89:cf:f7:c7:dc:c8:a7:40:a3:0a:88:81] modulus: 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 public exponent: 10001 ] 2021-11-14 12:17:02.108 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:17:02.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:17:02.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:17:02.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:17:02.111 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:17:02.111 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:17:02.112 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:17:02.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:17:02.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:17:02.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:17:02.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:17:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:17:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:17:02.117 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:17:02.204 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:17:02.205 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:17:02.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:17:02.208 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:17:02.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:17:02.209 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:17:02.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:17:02.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:17:02.210 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:17:02.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:17:02.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:17:02.211 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:17:02.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:17:02.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:17:02.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:17:02.213 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:17:02.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:b6:b4:27:e7:b5:fa:a0:2d:e0:3a:c9:85:30:07:4b:91:2e:ea:fa] modulus: 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 public exponent: 10001 ] 2021-11-14 12:19:18.601 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:19:18.601 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:19:18.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:19:18.603 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:19:18.603 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-14 12:19:18.604 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:19:18.604 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:19:18.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:19:18.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:19:18.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:19:18.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:19:18.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:19:18.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:19:18.610 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:19:18.712 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:19:18.712 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:19:18.713 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:19:18.713 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:19:18.714 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:19:18.715 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:19:18.715 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:19:18.715 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:19:18.716 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:19:18.716 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:19:18.716 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:19:18.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:19:18.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:19:18.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:19:18.718 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:19:18.718 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:19:18.721 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:02:c0:bb:26:99:b7:cd:e0:68:97:d2:86:c3:9c:58:c0:62:4f:4b] modulus: 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 public exponent: 10001 ] 2021-11-14 12:21:13.125 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:21:13.126 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:21:13.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:21:13.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:21:13.128 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-14 12:21:13.128 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:21:13.128 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:21:13.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:21:13.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:21:13.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:21:13.133 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:21:13.133 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:21:13.133 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:21:13.134 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:21:13.223 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:21:13.224 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:21:13.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:21:13.224 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:21:13.225 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:21:13.225 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:21:13.226 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:21:13.226 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:21:13.226 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:21:13.226 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:21:13.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:21:13.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:21:13.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:21:13.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:21:13.227 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:21:13.228 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:21:13.230 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:b1:12:97:70:68:98:7b:64:ed:25:2f:7e:27:e3:44:54:33:f2:e8] modulus: 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 public exponent: 10001 ] 2021-11-14 12:22:46.224 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-14 12:22:46.225 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-14 12:22:46.226 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:22:46.226 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-14 12:22:46.226 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-14 12:22:46.227 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-14 12:22:46.227 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-14 12:22:46.227 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-14 12:22:46.228 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-14 12:22:46.228 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-14 12:22:46.232 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-14 12:22:46.232 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:22:46.233 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-14 12:22:46.233 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:22:46.312 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-14 12:22:46.343 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-14 12:22:46.344 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-14 12:22:46.344 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-14 12:22:46.345 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-14 12:22:46.345 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-14 12:22:46.345 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:22:46.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:22:46.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:22:46.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:22:46.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:22:46.346 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:22:46.347 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-14 12:22:46.347 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-14 12:22:46.347 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-14 12:22:46.348 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-14 12:22:46.350 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 48731516184049023522069038764324561457032983172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 14 10:10:06 UTC 2021 Final Date: Fri Nov 14 10:10:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [94:68:13:82:f0:88:0b:ff:5c:74:3a:31:5f:fb:bc:59:d1:dc:7b:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7cde21f8d6ebd62e7a7869b0b13ccf6f7881a89a 11fb3d1fdf4d8ebbc1a848e821f6ccb1d298c89f 32b7e29e9d635779476070d1603a3ab04c1fb436 8ac99496e7d82615b7edaf45424f1fb253972981 4dce9236a7408d5c770be2f1ae07763f5b72456d 11f96d4e8d7c911190365120a3058b83e2e8e264 595492fe02e8603129613013acca76cfbb4fda29 81bf3ad190b78ce4a18d62b7c9cf75e8264f6d98 053d3a050a7bc93c520347a56377e979bdc1685e 957c2640f06df2b0bfe5e7d5b969c23f89bcc310 4d8922f3f96a7783de9a3b77ec8b74a4d3fec7ad 67a9c86136dfc85ae494fa2a6d457606c344d78f 797ec50b7a91789abc698d5e42171038b0fca8d5 109ec72cf1eeb8df17db55cded173b21c3a753a2 679d89cd336c30c4de99289396b7123fd6000fb9 52b26f9005070cd7ed08e7fd0a33b53a022ff730 32a0228a0bc274a0f8fc9affdfbb22db57e8c2f2 17f9df24b0a1b0b81332d3d569d6b11875f02f39 648a05ff6490fba5e623632f89520bc8971d9648 ac367e69 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:e3:1f:6c:0d:5d:ac:36:32:1c:f7:7a:11:f0:12:8c:b8:76:0a:fb] modulus: d0976bfa9bc1becfc8eeb02783a28bed4802538d87392190313da2116642567fed0710d8d2a8462c9acf08feec5c765a818847504f24f29de2c88d493594ffc4aad99807ffcdf95e50a25e9ba82421278706d8324bcea9fd16c8c7a111d42d168c02ad9f51f21d3c4ac0614e97c4861fd51a3346cf229ffba215ebd5828146d6efe84cfeb21d0fc39fc1defff93b8b4f2943aa72bf15dd6e5c5bd0556e52f9de37416ca7df63c4ac8f5e4394c291c5b2c3cd3eb3168e495f3e94cffcbea79fc1f6e7de37f459a4247b4a6e0050fc39a111259ddff0661ea785a5a2d68b3e92fd97d383f3c72931a0620708aa170cf017d309717577a5709c45841c6f7ac4a693 public exponent: 10001 ]