By type
2021-09-29 15:44:23,204 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-29 15:44:27,618 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-29 15:44:30.400 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-09-29 15:44:43.819 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-29 15:44:45.020 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-09-29 15:44:45.708 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-29 15:44:58.212 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 37.089 seconds (JVM running for 44.421) 2021-09-29 15:46:51.616 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 15:46:51.701 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 15:46:51.821 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-29 15:46:51.824 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 15:46:51.910 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-29 15:46:51.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 15:46:51.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 15:46:51.917 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 15:46:51.918 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 15:46:52.005 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 15:46:52.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 15:46:52.018 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 15:46:52.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 15:46:52.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 15:46:52.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 15:46:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 15:46:53.482 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 15:46:53.485 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 15:46:53.485 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 15:46:53.487 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 15:46:53.493 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 15:46:53.494 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 15:46:53.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 15:46:53.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 15:46:53.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 15:46:53.510 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 15:46:53.511 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 15:46:53.511 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 15:46:53.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 15:46:53.516 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 15:46:53.516 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 15:46:53.517 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 15:46:53.713 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:d9:53:1c:0b:99:7f:3e:7c:cd:68:9f:4e:c9:a2:80:b3:33:6d:06] modulus: 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 public exponent: 10001 ] 2021-09-29 20:15:41.037 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:15:41.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:15:41.042 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:15:41.043 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:15:41.043 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:15:41.044 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:15:41.044 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:15:41.044 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:15:41.045 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:15:41.045 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:15:41.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:15:41.101 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:15:41.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:15:41.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:15:41.304 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:15:41.305 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:15:41.305 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:15:41.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:15:41.309 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:15:41.310 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:15:41.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:15:41.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:15:41.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:15:41.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:15:41.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:15:41.405 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:15:41.407 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:15:41.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:15:41.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:15:41.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:15:41.505 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:25:6c:53:0e:e3:80:31:37:53:a2:e9:f4:2f:83:82:16:27:69:d6] modulus: e8513c848d1cb14668957bd5e82f0fc164c120707fd6e369f01a0da48f6074a985022e88d2a22dcf96d9944421c60275f8932d1264e0ae7efcd90668d216ee5ac032b5272410be572c361d1dcba87d502c44eccb0da4a855e71cdbf8b9f9c5a8c3e9fcd44992c01cd0522709237df06c9e22d3c485ae5637c9659bb04a1f8c860357685e607413836632e95984bbdecec74815c3b2b1c9f51cda681c910f64b6b4088f3ef96803915e52890f26c025a46d1515c364b00a07101b26c3fdad4411b0b30b3a80b484ae2fc93f7d0d1f703fe0fc86d2972aaf74916e741bd402dbf21d35d0b73589470914c1b088321d1d0cde04b2f47446a1084299a11af071f4bf public exponent: 10001 ] 2021-09-29 20:17:20.584 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:17:20.585 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:17:20.586 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:17:20.587 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:17:20.588 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:17:20.589 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:17:20.589 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:17:20.589 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:17:20.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:17:20.590 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:17:20.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:17:20.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:17:20.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:17:20.598 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:17:20.705 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:17:20.706 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:17:20.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:17:20.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:17:20.712 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:17:20.712 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:17:20.715 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:17:20.716 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:17:20.716 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:17:20.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:17:20.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:17:20.717 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:17:20.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:17:20.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:17:20.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:17:20.719 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:17:20.722 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:55:60:a9:06:32:f6:0d:cb:1e:51:eb:3f:ed:3f:1e:71:a4:db:55] modulus: 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 public exponent: 10001 ] 2021-09-29 20:20:36.853 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:20:36.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:20:36.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:20:36.858 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:20:36.860 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:20:36.861 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:20:36.861 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:20:36.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:20:36.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:20:36.862 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:20:36.901 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:20:36.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:20:36.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:20:36.904 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:20:36.998 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:20:37.000 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:20:37.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:20:37.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:20:37.003 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:20:37.004 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:20:37.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:20:37.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:20:37.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:20:37.007 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:20:37.007 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:20:37.008 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:20:37.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:20:37.010 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:20:37.011 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:20:37.012 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:20:37.016 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:6f:6c:f4:1d:11:39:0d:33:a5:f1:a7:39:0a:95:2b:56:25:4a:cb] modulus: 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 public exponent: 10001 ] 2021-09-29 20:21:10.425 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:21:10.427 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:21:10.428 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:21:10.429 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:21:10.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:21:10.430 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:21:10.430 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:21:10.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:21:10.430 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:21:10.431 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:21:10.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:21:10.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:10.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:10.435 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:10.580 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:21:10.581 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:21:10.582 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:21:10.600 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:10.603 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:21:10.604 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:21:10.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:10.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:10.605 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:10.606 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:10.607 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:10.607 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:10.608 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:10.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:10.609 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:10.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:21:10.614 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:71:78:39:28:1c:44:c1:6c:e9:f2:37:b3:26:37:fd:8c:9d:ba:7d] modulus: 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 public exponent: 10001 ] 2021-09-29 20:21:44.032 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:21:44.033 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:21:44.033 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:21:44.034 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:21:44.034 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:21:44.034 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:21:44.035 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:21:44.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:21:44.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:21:44.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:21:44.038 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:21:44.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:44.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:44.039 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:44.191 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:21:44.192 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:21:44.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:21:44.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:44.194 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:21:44.195 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:21:44.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:44.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:44.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:44.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:44.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:44.201 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:44.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:44.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:44.203 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:44.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:21:44.208 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: ace77dbdb38bac24d2292d7ede17129b88aa69b064c9b18c0fd2e5fe7a79a40ad0e5862148855a5ac9e376c355c92d8a485f2815cf846b7efcdd9caba6adc691b946f856480967c8c38b934017cd93f726147362ee1241575acbc5296c67e968246cae6e1d6a352d76e80649675e7bb67ec3dd8d40f767880d3ad70cb60bdd871da2163a46c6d4897f9e6e9c4fcf36caac08116ed2b026f315d421d4e5ab92598c05e0920a6d0908fae6879ed11947d9963c8dde65260d7c8369a0f8b9d622654af6840213981eeeaf695684a00092478830ce3e2c5868f88607e11b5fba9a52523a641d00566dff9ab4db7e10438012cddbaf143e0902f378e30af8f62b57317745788b06918671515f36f33a66e6cf2fcfab05f3c308359e45dc843156ad7a73e01849db034fc1c492316bb728e4a74b39f1718737d603ff9abca6a6c1c9817015332ecec95bdc71f7e66460cf944d1052f93c493caa93263d9d4bb08c4005dcf9f98bef88fa1963800ac842e073f8f75c09720bd992dc15f199682e705729 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:ae:65:83:2b:e3:08:c8:7c:ed:78:59:27:63:cf:1b:92:69:ee:70] modulus: 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 public exponent: 10001 ] 2021-09-29 20:21:51.021 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:21:51.022 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:21:51.023 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:21:51.024 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:21:51.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:21:51.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:21:51.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:21:51.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:21:51.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:21:51.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:21:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:21:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:51.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:21:51.030 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:51.108 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:21:51.108 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:21:51.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:21:51.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:21:51.111 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:21:51.112 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:21:51.112 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:51.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:51.113 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:51.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:51.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:51.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:51.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:21:51.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:21:51.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:21:51.116 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:21:51.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:75:36:1a:14:26:3c:3b:93:16:c3:aa:fe:36:4d:7f:81:25:b6:55] modulus: bed0a6aa140b11df2f1e45e11baf2850f7b26453cc1786cea1b375402d70e061d9d1b71a764a14e9c40fa882902b5d8d25690a2af1844caf6cef961f011351391986b9402698b90e7755234cdfab4bcc70cbbf42482fe92d95d8fcc89ba71d90258f6239755868e7fb5922c5c70cc8eaf0e76b55fe98c86fc29431c3563e9b064bc77ff275fe151a7fef889c6a3ab6496f3cdd8f7adc088979771c130eb668281567642125bc10d619c5acc48df6efa41631b261dade45596f8588e4d2cee1e0df1867e54bf164413c4b9a46cf8c6db918ef85e194ff13f4081760a9d3beb660be91be6543a60a988e6fa38e7c1885d32558c30f5e49430a2343e2203fe3d0af public exponent: 10001 ] 2021-09-29 20:23:30.303 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:23:30.305 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:23:30.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:23:30.307 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:23:30.308 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:23:30.309 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:23:30.309 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:23:30.310 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:23:30.310 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:23:30.310 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:23:30.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:23:30.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:23:30.316 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:23:30.317 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:23:30.500 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:23:30.501 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:23:30.501 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:23:30.502 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:23:30.504 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:23:30.504 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:23:30.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:23:30.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:23:30.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:23:30.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:23:30.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:23:30.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:23:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:23:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:23:30.507 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:23:30.508 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:23:30.512 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:94:c4:39:0d:d7:2d:4d:9d:d0:f8:d9:4f:9a:02:ef:9b:b2:3c:ea] modulus: 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 public exponent: 10001 ] 2021-09-29 20:26:31.053 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:26:31.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:26:31.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:26:31.056 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:26:31.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:26:31.057 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:26:31.057 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:26:31.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:26:31.057 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:26:31.058 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:26:31.061 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:26:31.062 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:26:31.062 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:26:31.062 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:26:31.155 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:26:31.156 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:26:31.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:26:31.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:26:31.158 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:26:31.200 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:26:31.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:26:31.200 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:26:31.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:26:31.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:26:31.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:26:31.201 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:26:31.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:26:31.202 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:26:31.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:26:31.203 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:26:31.206 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:4d:1f:f6:36:f4:93:72:3c:c6:26:78:d9:46:cb:0a:f8:8b:c1:88] modulus: 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 public exponent: 10001 ] 2021-09-29 20:31:14.512 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:31:14.513 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:31:14.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:31:14.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:31:14.516 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:31:14.516 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:31:14.516 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:31:14.517 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:31:14.517 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:31:14.517 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:31:14.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:31:14.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:31:14.522 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:31:14.522 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:31:14.614 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:31:14.615 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:31:14.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:31:14.616 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:31:14.617 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:31:14.618 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:31:14.618 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:31:14.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:31:14.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:31:14.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:31:14.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:31:14.620 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:31:14.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:31:14.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:31:14.621 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:31:14.622 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:31:14.624 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:cc:a9:21:29:43:fc:93:09:6d:74:51:27:71:db:ef:33:ca:08:d7] modulus: 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 public exponent: 10001 ] 2021-09-29 20:32:15.849 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:32:15.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:32:15.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:32:15.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:32:15.852 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:32:15.853 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:32:15.853 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:32:15.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:32:15.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:32:15.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:32:15.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:32:15.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:32:15.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:32:15.861 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:32:15.978 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:32:15.979 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:32:15.980 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:32:15.980 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:32:15.981 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:32:15.981 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:32:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:32:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:32:15.982 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:32:15.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:32:15.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:32:15.983 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:32:15.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:32:15.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:32:15.984 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:32:15.985 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:32:15.988 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: ace77dbdb38bac24d2292d7ede17129b88aa69b064c9b18c0fd2e5fe7a79a40ad0e5862148855a5ac9e376c355c92d8a485f2815cf846b7efcdd9caba6adc691b946f856480967c8c38b934017cd93f726147362ee1241575acbc5296c67e968246cae6e1d6a352d76e80649675e7bb67ec3dd8d40f767880d3ad70cb60bdd871da2163a46c6d4897f9e6e9c4fcf36caac08116ed2b026f315d421d4e5ab92598c05e0920a6d0908fae6879ed11947d9963c8dde65260d7c8369a0f8b9d622654af6840213981eeeaf695684a00092478830ce3e2c5868f88607e11b5fba9a52523a641d00566dff9ab4db7e10438012cddbaf143e0902f378e30af8f62b57317745788b06918671515f36f33a66e6cf2fcfab05f3c308359e45dc843156ad7a73e01849db034fc1c492316bb728e4a74b39f1718737d603ff9abca6a6c1c9817015332ecec95bdc71f7e66460cf944d1052f93c493caa93263d9d4bb08c4005dcf9f98bef88fa1963800ac842e073f8f75c09720bd992dc15f199682e705729 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:ec:ae:e1:5f:a2:3a:b0:90:f3:f5:fb:7b:c9:97:9c:4d:a6:ed:56] modulus: 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 public exponent: 10001 ] 2021-09-29 20:34:05.309 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:34:05.311 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:34:05.312 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:34:05.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:34:05.313 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:34:05.314 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:34:05.314 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:34:05.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:34:05.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:34:05.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:34:05.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:34:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:34:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:34:05.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:34:05.400 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:34:05.400 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:34:05.400 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:34:05.400 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:34:05.402 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:34:05.402 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:34:05.402 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:34:05.402 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:34:05.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:34:05.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:34:05.403 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:34:05.404 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:34:05.404 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:34:05.404 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:34:05.404 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:34:05.405 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:34:05.408 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: ace77dbdb38bac24d2292d7ede17129b88aa69b064c9b18c0fd2e5fe7a79a40ad0e5862148855a5ac9e376c355c92d8a485f2815cf846b7efcdd9caba6adc691b946f856480967c8c38b934017cd93f726147362ee1241575acbc5296c67e968246cae6e1d6a352d76e80649675e7bb67ec3dd8d40f767880d3ad70cb60bdd871da2163a46c6d4897f9e6e9c4fcf36caac08116ed2b026f315d421d4e5ab92598c05e0920a6d0908fae6879ed11947d9963c8dde65260d7c8369a0f8b9d622654af6840213981eeeaf695684a00092478830ce3e2c5868f88607e11b5fba9a52523a641d00566dff9ab4db7e10438012cddbaf143e0902f378e30af8f62b57317745788b06918671515f36f33a66e6cf2fcfab05f3c308359e45dc843156ad7a73e01849db034fc1c492316bb728e4a74b39f1718737d603ff9abca6a6c1c9817015332ecec95bdc71f7e66460cf944d1052f93c493caa93263d9d4bb08c4005dcf9f98bef88fa1963800ac842e073f8f75c09720bd992dc15f199682e705729 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:c0:7f:9e:9b:a0:3f:4d:83:0e:d7:ab:fd:61:2d:0a:10:14:c6:ce] modulus: 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 public exponent: 10001 ] 2021-09-29 20:35:40.175 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:35:40.176 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:35:40.178 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:35:40.179 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:35:40.179 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:35:40.180 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:35:40.180 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:35:40.181 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:35:40.181 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:35:40.181 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:35:40.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:35:40.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:35:40.185 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:35:40.186 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:35:40.294 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:35:40.295 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:35:40.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:35:40.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:35:40.298 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:35:40.299 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:35:40.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:40.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:40.301 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:40.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:40.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:40.304 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:35:40.306 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:2b:59:d4:f0:54:fe:b0:20:1e:0a:b6:78:97:f2:84:3e:2e:b8:29] modulus: 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 public exponent: 10001 ] 2021-09-29 20:35:49.393 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:35:49.394 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:35:49.395 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:35:49.396 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:35:49.396 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:35:49.396 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:35:49.396 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:35:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:35:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:35:49.397 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:35:49.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:35:49.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:35:49.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:35:49.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:35:49.471 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:35:49.471 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:35:49.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:35:49.472 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:35:49.473 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:35:49.473 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:35:49.474 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:49.474 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:49.474 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:49.475 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:49.475 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:49.475 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:49.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:35:49.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:35:49.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:35:49.477 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:35:49.479 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:70:df:2b:9a:eb:41:b0:b1:ea:07:86:e8:10:e3:b7:2c:c3:e8:21] modulus: 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 public exponent: 10001 ] 2021-09-29 20:36:24.517 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:36:24.518 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:36:24.519 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:36:24.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:36:24.520 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:36:24.520 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:36:24.520 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:36:24.521 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:36:24.521 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:36:24.521 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:36:24.524 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:36:24.525 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:36:24.525 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:36:24.525 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:36:24.607 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:36:24.608 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:36:24.608 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:36:24.608 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:36:24.610 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:36:24.610 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:36:24.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:36:24.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:36:24.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:36:24.611 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:36:24.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:36:24.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:36:24.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:36:24.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:36:24.612 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:36:24.613 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:36:24.614 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:b4:56:e0:18:65:b4:a5:24:6e:a1:74:7d:05:d7:bb:f5:f0:93:cc] modulus: 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 public exponent: 10001 ] 2021-09-29 20:37:14.551 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:37:14.552 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:37:14.553 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:37:14.553 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:37:14.553 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:37:14.554 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:37:14.554 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:37:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:37:14.554 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:37:14.555 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:37:14.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:37:14.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:37:14.559 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:37:14.560 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:37:14.670 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:37:14.671 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:37:14.671 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:37:14.672 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:37:14.674 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:37:14.674 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:37:14.675 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:37:14.675 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:37:14.675 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:37:14.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:37:14.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:37:14.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:37:14.677 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:37:14.677 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:37:14.677 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:37:14.678 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:37:14.682 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:80:19:b4:68:84:db:40:60:4f:99:23:f9:91:7c:6b:a3:ef:24:05] modulus: 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 public exponent: 10001 ] 2021-09-29 20:38:09.939 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:38:09.940 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:38:09.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:38:09.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:38:09.943 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:38:09.943 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:38:09.943 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:38:09.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:38:09.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:38:09.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:38:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:38:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:38:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:38:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:38:10.036 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:38:10.037 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:38:10.038 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:38:10.038 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:38:10.041 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:38:10.041 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:38:10.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:38:10.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:38:10.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:38:10.044 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:38:10.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:38:10.045 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:38:10.046 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:38:10.046 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:38:10.047 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:38:10.048 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:38:10.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:c3:77:c7:fe:fe:fb:8a:2c:e0:d4:a2:32:93:94:d6:96:f6:ec:31] modulus: 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 public exponent: 10001 ] 2021-09-29 20:39:40.377 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:39:40.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:39:40.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:39:40.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:39:40.380 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:39:40.380 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:39:40.381 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:39:40.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:39:40.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:39:40.381 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:39:40.386 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:39:40.387 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:39:40.387 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:39:40.387 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:39:40.473 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:39:40.473 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:39:40.474 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:39:40.474 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:39:40.475 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:39:40.476 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:39:40.476 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:39:40.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:39:40.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:39:40.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:39:40.478 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:39:40.478 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:39:40.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:39:40.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:39:40.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:39:40.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:39:40.483 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:ce:c4:99:59:60:4c:96:13:16:59:52:32:0a:69:36:bc:4b:10:62] modulus: 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 public exponent: 10001 ] 2021-09-29 20:40:46.739 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:40:46.739 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:40:46.740 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:40:46.741 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:40:46.741 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-29 20:40:46.741 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:40:46.741 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:40:46.741 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:40:46.742 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:40:46.742 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:40:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:40:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:40:46.746 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:40:46.747 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:40:46.885 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:40:46.885 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:40:46.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:40:46.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:40:46.888 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:40:46.888 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:40:46.888 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:46.889 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:46.889 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:46.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:46.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:46.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:46.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:46.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:46.891 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:46.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:40:46.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:1a:47:aa:fe:b4:56:41:a3:22:36:2e:50:a9:e5:51:db:a8:fb:cc] modulus: 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 public exponent: 10001 ] 2021-09-29 20:40:53.285 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:40:53.286 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:40:53.288 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:40:53.288 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:40:53.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:40:53.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:40:53.289 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:40:53.289 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:40:53.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:40:53.290 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:40:53.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:40:53.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:40:53.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:40:53.295 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:40:53.377 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:40:53.377 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:40:53.377 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:40:53.377 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:40:53.379 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:40:53.379 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:40:53.379 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:53.379 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:53.380 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:53.380 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:53.380 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:53.380 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:53.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:40:53.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:40:53.381 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:40:53.400 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:40:53.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:dc:18:f2:03:18:47:4a:e7:44:91:b8:a4:71:59:77:b5:0f:88:d3] modulus: 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 public exponent: 10001 ] 2021-09-29 20:42:25.440 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:42:25.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:42:25.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:42:25.500 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:42:25.500 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-29 20:42:25.501 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:42:25.502 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:42:25.503 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:42:25.503 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:42:25.504 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:42:25.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:42:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:42:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:42:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:42:25.601 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:42:25.603 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:42:25.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:42:25.603 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:42:25.605 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:42:25.606 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:42:25.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:42:25.607 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:42:25.608 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:42:25.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:42:25.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:42:25.609 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:42:25.611 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:42:25.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:42:25.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:42:25.612 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:42:25.616 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:22:39:f2:80:59:e8:43:12:b9:3b:f3:82:f8:3b:06:7e:14:17:f9] modulus: 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 public exponent: 10001 ] 2021-09-29 20:44:40.480 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:44:40.481 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:44:40.483 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:44:40.483 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:44:40.483 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-29 20:44:40.484 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:44:40.484 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:44:40.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:44:40.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:44:40.485 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:44:40.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:44:40.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:44:40.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:44:40.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:44:40.567 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:44:40.568 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:44:40.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:44:40.569 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:44:40.570 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:44:40.571 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:44:40.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:44:40.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:44:40.572 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:44:40.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:44:40.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:44:40.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:44:40.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:44:40.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:44:40.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:44:40.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:44:40.577 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:f5:86:fe:9d:4d:f6:ca:60:91:bb:aa:c6:c2:25:90:c0:c1:55:1d] modulus: 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 public exponent: 10001 ] 2021-09-29 20:45:10.031 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:45:10.036 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:45:10.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:45:10.038 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:45:10.039 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-29 20:45:10.039 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:45:10.039 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:45:10.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:45:10.039 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:45:10.040 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:45:10.045 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:45:10.045 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:45:10.045 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:45:10.046 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:45:10.133 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:45:10.133 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:45:10.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:45:10.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:45:10.136 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:45:10.136 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:45:10.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:10.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:10.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:10.138 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:10.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:10.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:10.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:10.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:45:10.142 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:9d:d9:51:3d:9a:44:05:7e:c1:98:1d:79:75:71:fd:cf:e7:34:0e] modulus: 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 public exponent: 10001 ] 2021-09-29 20:45:46.580 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:45:46.581 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:45:46.582 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:45:46.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:45:46.583 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-29 20:45:46.584 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:45:46.584 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:45:46.584 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:45:46.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:45:46.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:45:46.591 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:45:46.592 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:45:46.592 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:45:46.592 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:45:46.673 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:45:46.674 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:45:46.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:45:46.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:45:46.676 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:45:46.677 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:45:46.677 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:46.678 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:46.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:45:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:45:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:45:46.680 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:45:46.682 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:78:ff:0f:4a:1c:58:14:3e:39:55:2f:9d:91:b0:aa:4b:ba:bc:93] modulus: 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 public exponent: 10001 ] 2021-09-29 20:47:31.147 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-09-29 20:47:31.148 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-09-29 20:47:31.150 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:47:31.151 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-29 20:47:31.151 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-29 20:47:31.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-09-29 20:47:31.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-09-29 20:47:31.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-09-29 20:47:31.152 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-09-29 20:47:31.153 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-09-29 20:47:31.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-09-29 20:47:31.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:47:31.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-09-29 20:47:31.157 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:47:31.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-09-29 20:47:31.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-09-29 20:47:31.250 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-09-29 20:47:31.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-09-29 20:47:31.300 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-09-29 20:47:31.301 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-09-29 20:47:31.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:47:31.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:47:31.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:47:31.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:47:31.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:47:31.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:47:31.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-29 20:47:31.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-09-29 20:47:31.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-09-29 20:47:31.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-29 20:47:31.304 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 128116758181931286070647762232748580840669763903 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 29 15:40:30 UTC 2021 Final Date: Mon Sep 29 15:40:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1c:1f:20:1f:4f:a3:19:78:4b:ef:82:93:17:e1:e8:6b:7e:cf:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 936e449d9f8b0e10e9ea9da82b0fd00c2d1cc4fd 044c15604b9aa17c7b0f01951a4b565c9fa4155f 1f6420628162c9a9837c061ca58d57f02aab77a4 c48464a56e588b6b790d2d7d8bffc3acb8626a1c 660f95b7c182fc15de765381ac88fcc583ec2fe5 d4c6798861df89007946e1952f9ae39c700f2201 a2eb35fe6070df7db123409d0a5b8de16933f730 892f552f873107959b45104bfe010b5f971a4092 e35cc27331f87b171c92aabadb0512f53f89d9b6 3140935234c178ba3f17ea6776d350338ac31e49 f72fbe09d621839397e9d47625bc54a089e5e1ad cd0b71747f97d5a50619484d6779b17adfda20cb 838f1606a2442fdfdacb0271e86bd755a6181cfb 5ed0513273cdfd89fc773ebdb242eccb8c82c277 2086dcb277df7be96931da4352c732fd4c220c03 926a410bc450979210aab7d9fa702cd6ff01d886 b8678cc91a1f45d479d39bc5b9b5e1a650d306fb 29e8ac9c4d5a0e520bedf98d8d49c3f78e8a48ae 8ff665942be7ab3f504933ed690fd6a7537fa5ad 7e3d00c0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:88:57:09:79:d8:12:ea:e8:5e:d5:d1:f7:a9:17:c1:ef:40:1b:2e] modulus: d130e7bfaf08eaea2d624becf774512031da5dac0af9f9d2d6119b14f09917ac0a1997d2244857d8219b9eebb99c7df7ff109baeaba13812ca2f88406e542cfd81423ccfcbab786c0c29b3e420fab08bc70bb1a83a0d0e60739c17176393c5581d954432efe569b7dbbf075c14e5d4bb6f40356330f45711d5cc85278a22dbc0130a6d7a72a1fc9de5fa637106694165ae2978a1863eeecb2e0402c815bb67003adb4e19e2a791e2fe1655352b852a42c5ed8b50831f90a043cde6de7ad3002a902f77160deb273049bff9572d5f90a4ce5287e76af701ee3e940738d4ab398290f3aacd6ec4daa61841c5a3e6034e37baa1b8f1f18fc09dd522eacb1a24d189 public exponent: 10001 ]