By type
2021-10-07 02:30:52,905 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-07 02:30:57,108 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-07 02:31:00.320 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-07 02:31:15.204 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-07 02:31:16.903 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-07 02:31:17.798 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-07 02:31:30.623 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.211 seconds (JVM running for 48.376) 2021-10-07 02:32:19.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 02:32:20.006 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 02:32:20.212 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-07 02:32:20.296 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 02:32:20.398 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-07 02:32:20.402 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 02:32:20.403 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 02:32:20.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 02:32:20.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 02:32:20.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 02:32:20.415 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 02:32:20.500 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 02:32:20.695 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 02:32:20.703 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 02:32:20.704 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 02:32:20.708 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 02:32:22.290 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 02:32:22.293 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 02:32:22.294 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 02:32:22.296 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 02:32:22.303 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 02:32:22.304 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 02:32:22.305 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 02:32:22.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 02:32:22.306 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 02:32:22.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 02:32:22.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 02:32:22.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 02:32:22.400 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 02:32:22.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 02:32:22.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 02:32:22.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 02:32:22.517 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:35:48:62:f7:9d:fe:d5:9c:84:68:fd:08:4f:84:dd:87:93:d0:c0] modulus: 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 public exponent: 10001 ] 2021-10-07 06:34:42.098 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:34:42.100 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:34:42.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:34:42.104 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:34:42.105 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:34:42.106 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:34:42.106 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:34:42.106 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:34:42.107 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:34:42.108 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:34:42.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:34:42.203 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:34:42.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:34:42.204 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:34:42.409 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:34:42.410 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:34:42.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:34:42.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:34:42.416 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:34:42.417 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:34:42.417 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:34:42.418 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:34:42.418 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:34:42.420 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:34:42.420 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:34:42.420 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:34:42.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:34:42.422 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:34:42.422 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:34:42.495 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:34:42.501 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: b7f1fe1d0b57c6ca147b4c5d6b68b86ba2767705f7be3b00147e39184da9b3fc7d2404f36b4af8c12ab9eff96b8671b49524a17e48a931cb64cbc95f4c78297b12aae125f1975cde5e26519cc66615f3a2a8d522201c0e66dd408bc639e27d47314072c68f0a59f4744ad146389947617510f1179d9b06b3aa4a49f387d30ceca11c314e9c3088dde034add362e97d212bcc1eef0574fb3f71d37a3dbd91efafb1f259108a3cc61bbf2d9bc51c1bc2d08d85b348ba394174945cf9c013ec12dae3803b7443480e574e743c4455cac75e5edd10ee1b9d34fafbb73e8ab95be7349c52d366e336a39af5eead8b9e59ef4044e7020ab87cee0f29733cf12ea96bf8be431ed788a64866178948a60ce540210ad8a7468ad120ff25ee332d2cb9958d22fb380dde9a4f7c4a678b7df613b96e17b86c991cb12973eb48f64104675faec8ed4ac95884d4e297e447d1c3f4a290152ef6d189503ebf6061b78b01fb3a4ee227064d945ef4f089db4ebf44787480b5c04af4311400e087ce62a49c37740f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:f5:e6:f4:f1:a1:c2:27:3c:fe:e2:35:84:7d:46:10:1e:4c:5f:a9] modulus: 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 public exponent: 10001 ] 2021-10-07 06:36:46.401 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:36:46.402 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:36:46.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:36:46.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:36:46.498 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:36:46.500 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:36:46.500 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:36:46.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:36:46.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:36:46.502 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:36:46.595 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:36:46.596 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:36:46.597 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:36:46.597 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:36:46.685 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:36:46.695 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:36:46.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:36:46.696 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:36:46.698 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:36:46.699 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:36:46.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:36:46.700 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:36:46.701 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:36:46.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:36:46.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:36:46.702 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:36:46.703 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:36:46.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:36:46.704 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:36:46.705 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:36:46.708 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:31:ef:68:e8:d9:35:cb:37:19:49:56:83:3c:07:38:ad:fc:31:3a] modulus: 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 public exponent: 10001 ] 2021-10-07 06:41:16.767 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:41:16.768 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:41:16.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-07 06:41:16.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:41:16.770 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-07 06:41:16.770 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:41:16.771 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:41:16.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:41:16.771 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:41:16.772 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:41:16.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:41:16.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:41:16.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:41:16.778 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:41:16.895 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:41:16.896 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:41:16.896 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:41:16.897 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:41:16.899 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:41:16.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:41:16.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:41:16.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:41:16.902 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:41:16.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:41:16.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:41:16.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:41:16.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:41:16.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:41:16.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:41:16.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:41:16.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:42:d4:4b:df:91:d8:29:f9:5c:f0:96:3e:0d:b8:0d:15:ae:dd:6b] modulus: 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 public exponent: 10001 ] 2021-10-07 06:43:07.752 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:43:07.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:43:07.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:43:07.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:43:07.757 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:43:07.757 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:43:07.757 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:43:07.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:43:07.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:43:07.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:43:07.762 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:43:07.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:43:07.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:43:07.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:43:07.882 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:43:07.883 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:43:07.894 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:43:07.895 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:43:07.897 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:43:07.897 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:43:07.898 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:43:07.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:43:07.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:43:07.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:43:07.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:43:07.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:43:07.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:43:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:43:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:43:07.905 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:43:07.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:97:4c:a7:5e:a9:5b:92:20:77:c0:30:07:02:5a:91:eb:95:fe:84] modulus: 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 public exponent: 10001 ] 2021-10-07 06:45:55.887 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:45:55.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:45:55.890 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:45:55.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:45:55.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:45:55.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:45:55.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:45:55.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:45:55.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:45:55.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:45:55.897 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:45:55.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:45:55.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:45:55.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:45:55.980 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:45:55.995 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:45:55.995 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:45:55.996 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:45:55.997 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:45:55.998 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:45:55.998 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:45:55.999 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:45:55.999 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:45:56.000 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:45:56.000 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:45:56.000 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:45:56.001 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:45:56.001 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:45:56.002 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:45:56.003 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:45:56.007 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:d0:98:87:b9:ff:89:98:38:b5:e2:51:d3:9e:45:f1:39:a5:da:b0] modulus: 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 public exponent: 10001 ] 2021-10-07 06:47:30.771 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:47:30.773 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:47:30.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:47:30.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:47:30.775 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:47:30.776 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:47:30.776 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:47:30.776 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:47:30.777 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:47:30.777 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:47:30.783 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:47:30.783 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:47:30.783 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:47:30.784 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:47:30.881 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:47:30.881 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:47:30.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:47:30.896 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:47:30.898 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:47:30.899 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:47:30.900 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:47:30.900 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:47:30.901 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:47:30.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:47:30.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:47:30.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:47:30.904 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:47:30.905 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:47:30.905 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:47:30.906 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:47:30.910 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:69:cd:3e:ee:39:48:6c:51:63:7c:f5:ac:82:ec:b1:a2:ca:0a:8d] modulus: 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 public exponent: 10001 ] 2021-10-07 06:48:02.645 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:48:02.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:48:02.648 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:48:02.649 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:48:02.649 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:48:02.650 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:48:02.650 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:48:02.650 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:48:02.651 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:48:02.651 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:48:02.655 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:48:02.695 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:02.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:02.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:02.787 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:48:02.795 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:48:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:48:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:02.798 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:48:02.799 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:48:02.799 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:02.799 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:02.800 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:02.800 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:02.801 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:02.801 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:02.802 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:02.802 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:02.802 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:02.803 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:48:02.806 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:82:a6:e9:08:64:9c:42:24:66:73:59:7b:45:b5:cc:fd:be:1d:7b] modulus: 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 public exponent: 10001 ] 2021-10-07 06:48:31.174 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:48:31.175 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:48:31.177 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:48:31.177 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:48:31.178 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:48:31.178 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:48:31.179 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:48:31.179 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:48:31.179 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:48:31.179 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:48:31.183 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:48:31.184 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:31.184 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:31.184 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:31.252 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:48:31.253 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:48:31.253 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:48:31.254 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:31.255 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:48:31.256 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:48:31.256 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:31.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:31.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:31.257 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:31.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:31.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:31.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:31.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:31.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:31.296 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:48:31.300 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:22:52:ea:25:1d:5b:10:f5:40:fd:2b:27:4c:fe:d7:94:53:c3:de] modulus: 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 public exponent: 10001 ] 2021-10-07 06:48:32.324 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:48:32.325 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:48:32.327 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:48:32.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:48:32.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:48:32.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:48:32.329 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:48:32.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:48:32.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:48:32.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:48:32.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:48:32.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:32.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:48:32.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:32.463 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:48:32.463 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:48:32.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:48:32.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:48:32.466 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:48:32.466 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:48:32.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:32.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:32.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:32.496 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:32.497 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:32.497 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:32.498 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:48:32.499 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:48:32.499 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:48:32.499 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:48:32.502 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:96:75:fb:77:5c:ce:eb:cf:54:4a:cd:94:c1:96:1a:15:d3:96:0f] modulus: b8310d2910f9e874469bc2d1ec70aaf3b4efb8de7d3881f39fe315b35dfb697b116f55d53e70fa5ad8529b525d9d5f975597186e475a0a94fe16848ee233837eab3eb12c270a12f3c4e15c0b93c3ab055c2a18de35e874661468a341b499bc2328cb7b76eaea78ddd7d6e18e822d998dcff488a15331b2d59b3c9fd48a615d506ab4de54a89f658575afb582fcf51147982264a71a3a3702553ae7cb9a0f3f12ddf77c9e54224f036217a9a2e3836897a411b871d9720e083988cb6cd326a75b04411033028a8903819c94fcf6f3d2a03078b579b090e848db86cea0e608bb3adb072c03b9ccb3ac4136f1448dc8a631e93915126d9f0328caa1638ecbe0e807 public exponent: 10001 ] 2021-10-07 06:49:02.626 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:49:02.627 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:49:02.628 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-07 06:49:02.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:49:02.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-07 06:49:02.629 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:49:02.630 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:49:02.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:49:02.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:49:02.630 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:49:02.640 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:49:02.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:49:02.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:49:02.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:49:02.787 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:49:02.788 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:49:02.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:49:02.789 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:49:02.791 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:49:02.792 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:49:02.792 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:02.793 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:02.793 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:02.794 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:02.794 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:02.795 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:02.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:02.798 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:49:02.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: b7f1fe1d0b57c6ca147b4c5d6b68b86ba2767705f7be3b00147e39184da9b3fc7d2404f36b4af8c12ab9eff96b8671b49524a17e48a931cb64cbc95f4c78297b12aae125f1975cde5e26519cc66615f3a2a8d522201c0e66dd408bc639e27d47314072c68f0a59f4744ad146389947617510f1179d9b06b3aa4a49f387d30ceca11c314e9c3088dde034add362e97d212bcc1eef0574fb3f71d37a3dbd91efafb1f259108a3cc61bbf2d9bc51c1bc2d08d85b348ba394174945cf9c013ec12dae3803b7443480e574e743c4455cac75e5edd10ee1b9d34fafbb73e8ab95be7349c52d366e336a39af5eead8b9e59ef4044e7020ab87cee0f29733cf12ea96bf8be431ed788a64866178948a60ce540210ad8a7468ad120ff25ee332d2cb9958d22fb380dde9a4f7c4a678b7df613b96e17b86c991cb12973eb48f64104675faec8ed4ac95884d4e297e447d1c3f4a290152ef6d189503ebf6061b78b01fb3a4ee227064d945ef4f089db4ebf44787480b5c04af4311400e087ce62a49c37740f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:02:45:1a:4f:3c:54:cc:bb:eb:f6:c0:b8:75:d7:1f:cf:b0:69:02] modulus: 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 public exponent: 10001 ] 2021-10-07 06:49:43.716 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:49:43.717 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:49:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-07 06:49:43.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:49:43.719 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-07 06:49:43.719 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:49:43.719 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:49:43.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:49:43.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:49:43.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:49:43.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:49:43.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:49:43.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:49:43.725 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:49:43.888 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:49:43.888 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:49:43.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:49:43.889 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:49:43.891 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:49:43.892 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:49:43.892 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:43.893 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:43.893 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:43.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:43.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:43.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:43.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:49:43.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:49:43.896 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:49:43.896 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:49:43.900 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:87:10:39:a0:a8:5d:13:b7:9a:e7:31:23:ce:fd:11:28:68:53:b5] modulus: d7efb73e48436b64b954a44d766618ee8a16456f15a3562d33f91c5c76c07c1b8ff51a976a6a2e58e1e48f75d79be91443d6e1f6e8ae0212fff89218a1c60de9f6404799adef802f0e5e66a40de9a6344a1b4145b3650fe10b0e3c1ab180ba98ba7f8d106dad25b1b98a23f54c79e1bad48973d8ca132cd6e0a6ec45734290396969888a8bf31444dc3866704bf0fad9c73e462f1e66bb99e56908e204b1f30a2fb678da9b56f2bb287a3ff91de05a9be5a23de12d20828c7b09d82f1268c50284a2f7e6a448ff38ce53aab64c124c0c5035a4e7407674f281532bb4b17a783372ccccf66cc593211349dc8e4470ec112575f0ce051d4bfc617f40678534501d public exponent: 10001 ] 2021-10-07 06:52:05.019 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:52:05.023 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:52:05.025 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:52:05.027 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:52:05.030 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 06:52:05.030 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:52:05.031 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:52:05.031 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:52:05.031 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:52:05.032 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:52:05.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:52:05.038 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:52:05.039 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:52:05.039 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:52:05.234 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:52:05.235 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:52:05.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:52:05.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:52:05.237 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:52:05.237 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:52:05.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:52:05.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:52:05.238 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:52:05.238 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:52:05.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:52:05.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:52:05.240 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:52:05.240 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:52:05.240 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:52:05.241 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:52:05.245 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:79:87:4a:46:4a:d4:6b:c3:15:78:4c:4b:1e:30:4f:21:75:ff:58] modulus: 99b4230a5582ec09dab40b2d11ebc697246dcbfe299e85044f6029a1e4b13e2904fcafe7fa48bebeb050dbf46eac97257009a24e9755b6f8f00852e88f86d16ca2a9c2b37ae6d56892383531d405a12492edce33128537e071c6ec7ecd91a8f4e3b50c58016b6ca18dd7a16386354685894d37b8ef20c2f2d993733fc2494be19df187e002480a0af8723d86918eacb4f6730058ded143c0e3fdf4d386cfccec087b2709e947f4a5384d69daef79d7ffb4ea4318ad88f840ac38678ec3b851d6a648581e15b1b658d8fda36b85b3d1288b64e19b0bf93a7a3bd8de735e549e027a63509eb4242ecb1663115f280087d0b82bbe47c718e5c5c06205b23d4ad345 public exponent: 10001 ] 2021-10-07 06:53:26.754 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:53:26.755 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:53:26.756 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:53:26.757 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:53:26.757 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:53:26.757 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:53:26.758 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:53:26.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:53:26.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:53:26.758 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:53:26.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:53:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:53:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:53:26.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:53:26.849 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:53:26.850 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:53:26.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:53:26.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:53:26.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:53:26.851 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:53:26.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:26.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:26.853 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:26.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:53:26.856 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:79:e9:6d:30:84:89:bc:cc:21:2d:d7:76:cf:91:d4:a7:a4:44:1c] modulus: c70c2c992169dac31e8a44d6341063ea5390da73564dd5170d5fc8d982e76a4e9423e2d2a0c3d14c30caaf894712d7ac56988745d4df69a944efd835619b5eed91f2ebe48d5432b504c693b7d3007cfc2c483e3f173c9891d18126a008eee6e982883610ab61e6a4039132943be48e0d1318a14bfd43e91d467d8868ef10f178a82d1ce027e863974356ff4b13cd10c4c437d1f62b450db826c1df8d54a4a2ba9731aef901ed2fa9775d48f870becd73964fd58b5944ec3ee5218de3d485bc16d12ffcefc46d58789dfbea5b8701e767c0ee04a3e4c6d9d18b4533bc3f00a253d704dc7c27c6498a0a332092fb1d87f71f553df1278f93ecdc855fe5d64dc5bd public exponent: 10001 ] 2021-10-07 06:53:50.006 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:53:50.007 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:53:50.008 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:53:50.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:53:50.009 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-07 06:53:50.010 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:53:50.010 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:53:50.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:53:50.010 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:53:50.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:53:50.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:53:50.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:53:50.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:53:50.015 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:53:50.101 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:53:50.102 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:53:50.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:53:50.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:53:50.105 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:53:50.106 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:53:50.106 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:50.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:50.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:50.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:50.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:50.108 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:50.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:53:50.109 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:53:50.110 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:53:50.111 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:53:50.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:19:fe:b7:2a:c6:4b:a4:a3:5c:e9:17:9b:af:67:91:bb:e3:d2:4a] modulus: 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 public exponent: 10001 ] 2021-10-07 06:55:18.296 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:55:18.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:55:18.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-07 06:55:18.299 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:55:18.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-07 06:55:18.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:55:18.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:55:18.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:55:18.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:55:18.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:55:18.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:55:18.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:55:18.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:55:18.308 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:55:18.422 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:55:18.423 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:55:18.423 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:55:18.423 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:55:18.425 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:55:18.425 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:55:18.426 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:55:18.426 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:55:18.426 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:55:18.427 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:55:18.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:55:18.428 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:55:18.429 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:55:18.429 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:55:18.429 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:55:18.430 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:55:18.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:e4:91:7a:b9:65:9c:17:81:fa:c5:47:2b:cc:cb:3a:8f:8b:4d:78] modulus: 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 public exponent: 10001 ] 2021-10-07 06:58:01.677 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:58:01.682 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:58:01.683 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:58:01.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:58:01.687 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-07 06:58:01.688 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:58:01.688 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:58:01.691 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:58:01.692 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:58:01.695 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:58:01.702 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:58:01.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:58:01.705 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:58:01.707 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:58:01.825 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:58:01.827 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:58:01.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:58:01.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:58:01.830 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:58:01.830 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:58:01.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:01.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:01.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:01.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:01.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:01.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:01.833 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:01.833 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:01.833 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:01.836 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:58:01.846 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:72:41:d6:21:c9:eb:a0:18:ff:d2:28:2b:40:2a:42:09:e2:78:10] modulus: 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 public exponent: 10001 ] 2021-10-07 06:58:32.897 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:58:32.898 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:58:32.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-07 06:58:32.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:58:32.901 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-07 06:58:32.901 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:58:32.901 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:58:32.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:58:32.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:58:32.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:58:32.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:58:32.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:58:32.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:58:32.907 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:58:32.987 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:58:32.988 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:58:32.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:58:32.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:58:32.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:58:32.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:58:32.991 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:32.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:32.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:32.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:32.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:58:32.995 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:58:32.995 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:58:32.996 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:58:32.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:a0:ea:d4:c4:0c:9b:a9:d2:79:87:0b:5c:d2:e5:23:a6:e7:2e:fe] modulus: c5589e57e9755c828f6017e74bcfc5ec1908f621878ea48103aba2cc646d3bc946ebba84e1079629bda8d1cd0087e4f6592822ff3a0b876afade5df7c605c79c5b0b2048b31a2ed809af720ff0d4219fb372a2ce06f3f03d1911cbfb77614fd1d011b7dee88b07b7773bf1d1a5d0016d9830eb49faea74e7f09393dd815f1251c43aeb14be4396e113c7f9eebd76fd3a51697339c6595202a501b821d05360c68f678ade8c44dba3d37611bc7ec9c8ccb617ba7b1e98ca11affeecba088f82e52d25e34f5f0fa5a82097359891ea065318f2171f29c6dbb77d26376fdb374084ab90ef5c043f3c41625ec93fe088c9c25c7f06fd1b039ba930ac2dcdc803f7e1 public exponent: 10001 ] 2021-10-07 06:59:06.263 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 06:59:06.264 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 06:59:06.265 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-07 06:59:06.266 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 06:59:06.266 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-07 06:59:06.266 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 06:59:06.266 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 06:59:06.267 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 06:59:06.267 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 06:59:06.267 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 06:59:06.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 06:59:06.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:59:06.298 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 06:59:06.298 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:59:06.405 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 06:59:06.406 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 06:59:06.406 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 06:59:06.406 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 06:59:06.408 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 06:59:06.408 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 06:59:06.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:59:06.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:59:06.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:59:06.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:59:06.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:59:06.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:59:06.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 06:59:06.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 06:59:06.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 06:59:06.413 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 06:59:06.496 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:79:e4:5e:9f:07:b9:89:1e:af:c1:b8:12:36:95:3c:ac:63:f5:94] modulus: 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 public exponent: 10001 ] 2021-10-07 07:01:12.144 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-07 07:01:12.145 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-07 07:01:12.147 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 07:01:12.147 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-07 07:01:12.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-07 07:01:12.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-07 07:01:12.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-07 07:01:12.149 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-07 07:01:12.149 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-07 07:01:12.150 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-07 07:01:12.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-07 07:01:12.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 07:01:12.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-07 07:01:12.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 07:01:12.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-07 07:01:12.250 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-07 07:01:12.250 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-07 07:01:12.250 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-07 07:01:12.251 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-07 07:01:12.252 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-07 07:01:12.252 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 07:01:12.252 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 07:01:12.252 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 07:01:12.253 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 07:01:12.253 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 07:01:12.253 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 07:01:12.254 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-07 07:01:12.254 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-07 07:01:12.254 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-07 07:01:12.255 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-07 07:01:12.257 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 301479064821122281715263295466554995528072926617 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 07 02:23:22 UTC 2021 Final Date: Tue Oct 07 02:23:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9157335c5cce3fec9c6766b972652a88e19605c1 5d907385b01af8e24e2ccb77f0e4b768593cb530 8cdb13c71e5824d204954e14e43a7029cc39a748 448343a8286bea2c2a7c6e623b1ae02e8ca23f0c 187421d11d873e115f10a56cf34489b5654787c3 17b8301dfe130a40344807de42431f44291fd25c a5a8164f36cf648440efb3781f9f3e108ff6ffd0 3bccdf926f58627a90de9795966ffa493045349e 9f74a1b88e50b9741af50388ccd3811162e81985 a29ee7790d908f376088ab045dfef8d08acbaaeb 71da6679adcb1b3c4adca6d0554d47cf41f831d0 8e6563d57e0c6b7066e9c877d835917c6280877f b07ec3391ed0d419a7fe52393bfdcaa78107def5 98a3620e1f550e0c076887f33b2da1c6b7dd3c44 92bf6229fb9bcda17a98645d94b4bed06816cc49 04d9e5585963b103378d8d000d5de876f15f718a 4dac3b909b6acde72d069157ae90b01e63410392 f7ffbde121fe523ff78fc4dce4cd347f0ae01f91 f0c441aa4bd1aac177a3f0ee7a75685118764e2e 1692d2ba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:c2:a8:46:e3:c2:16:f7:57:70:92:35:13:ca:c8:9f:ef:77:34:f9] modulus: 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 public exponent: 10001 ]