By type
2021-10-08 02:41:02,904 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-08 02:41:07,213 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-08 02:41:10.207 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-08 02:41:23.833 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-08 02:41:24.902 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-08 02:41:25.618 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-08 02:41:37.922 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 37.405 seconds (JVM running for 44.732) 2021-10-08 02:47:31.501 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 02:47:31.516 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 02:47:31.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 02:47:31.700 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 02:47:31.715 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-08 02:47:31.720 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 02:47:31.721 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 02:47:31.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 02:47:31.801 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 02:47:31.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 02:47:31.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 02:47:31.815 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 02:47:32.102 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 02:47:32.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 02:47:32.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 02:47:32.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 02:47:33.421 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 02:47:33.425 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 02:47:33.426 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 02:47:33.428 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 02:47:33.500 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 02:47:33.501 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 02:47:33.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 02:47:33.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 02:47:33.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 02:47:33.518 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 02:47:33.518 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 02:47:33.519 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 02:47:33.605 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 02:47:33.606 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 02:47:33.607 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 02:47:33.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 02:47:33.711 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:a1:96:30:b5:fe:0e:d1:40:a8:09:d9:76:6d:cd:6a:56:f3:e5:bc] modulus: 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 public exponent: 10001 ] 2021-10-08 06:45:16.210 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:45:16.214 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:45:16.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 06:45:16.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:45:16.218 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-08 06:45:16.220 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:45:16.222 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:45:16.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:45:16.223 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:45:16.225 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:45:16.308 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:45:16.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:45:16.310 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:45:16.311 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:45:16.598 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:45:16.599 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:45:16.600 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:45:16.600 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:45:16.602 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:45:16.603 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:45:16.603 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:45:16.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:45:16.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:45:16.605 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:45:16.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:45:16.606 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:45:16.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:45:16.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:45:16.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:45:16.608 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:45:16.701 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:47:7b:9e:36:a1:07:ba:87:aa:99:9d:ba:25:fa:7d:f9:8c:94:30] modulus: a5c883aa0e429acaf0cc22fa1af43f6d9e42c6f4054ff7cb1f0a867209fa7dc98a4335364a1ae996185d366c32746d5b7e6d24674a35373618fff79a0848bad35eca82e6d907645878bb4aa5daaf6e4eef57238bc1590d3070f4a477b9d3090712a66f1a61c0012f2f747def587a3e19fbef73e31c033c321cdec8a924f04e1c7a059e5e2b14419cb37801894d7ba48b33c24d026af6b97bbb835f72c01284ffa84db8bd168bf0ca21cead576f21824f23f2017d143a5519d77b198609d2ff1455756f2487057fe4548ed170cf78048e3f3f38439ded17079680d4605f6a2c48049dda5fe209bdaacfff57f762881e6d76cff83eee660ebfb968ab610376b1b1 public exponent: 10001 ] 2021-10-08 06:47:11.900 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:47:11.901 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:47:11.903 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:47:11.904 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:47:11.905 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:47:11.906 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:47:11.906 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:47:11.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:47:11.907 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:47:11.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:47:11.913 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:47:11.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:47:11.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:47:11.914 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:47:12.112 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:47:12.113 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:47:12.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:47:12.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:47:12.116 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:47:12.117 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:47:12.117 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:47:12.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:47:12.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:47:12.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:47:12.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:47:12.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:47:12.121 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:47:12.122 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:47:12.122 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:47:12.123 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:47:12.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:14:c7:80:65:20:74:2d:4e:19:eb:65:b5:fd:ff:26:a2:b2:99:28] modulus: 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 public exponent: 10001 ] 2021-10-08 06:49:42.289 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:49:42.291 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:49:42.293 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 06:49:42.294 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:49:42.299 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 06:49:42.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:49:42.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:49:42.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:49:42.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:49:42.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:49:42.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:49:42.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:49:42.311 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:49:42.312 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:49:42.499 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:49:42.500 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:49:42.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:49:42.501 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:49:42.504 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:49:42.505 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:49:42.505 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:49:42.506 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:49:42.506 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:49:42.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:49:42.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:49:42.508 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:49:42.508 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:49:42.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:49:42.509 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:49:42.510 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:49:42.514 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:82:69:62:2e:cf:97:9d:69:3f:00:43:c9:22:33:27:97:1f:b6:5a] modulus: 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 public exponent: 10001 ] 2021-10-08 06:50:19.963 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:50:19.964 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:50:19.965 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:50:19.966 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:50:19.966 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:50:19.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:50:19.967 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:50:19.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:50:19.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:50:19.968 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:50:20.001 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:50:20.002 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:50:20.002 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:50:20.002 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:50:20.116 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:50:20.116 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:50:20.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:50:20.117 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:50:20.119 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:50:20.120 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:50:20.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:20.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:20.121 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:20.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:20.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:20.122 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:20.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:20.123 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:20.124 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:20.125 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:50:20.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:95:f8:55:61:a6:d4:43:6e:60:4e:49:c5:38:57:98:e7:ef:46:aa] modulus: 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 public exponent: 10001 ] 2021-10-08 06:50:54.447 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:50:54.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:50:54.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-08 06:50:54.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:50:54.451 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-08 06:50:54.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:50:54.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:50:54.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:50:54.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:50:54.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:50:54.459 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:50:54.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:50:54.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:50:54.499 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:50:54.621 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:50:54.621 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:50:54.622 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:50:54.622 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:50:54.623 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:50:54.624 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:50:54.624 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:54.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:54.625 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:54.627 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:50:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:50:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:50:54.629 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:50:54.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:15:9a:fd:d5:df:3e:7f:47:61:69:13:50:d5:05:c1:51:ee:3b:2a] modulus: b76bb214ea579375da4af09ec0bb621eb266eb03e945c5386f8ab7c5a2dc3f963a6c4916b904fed3a894b19b146c2deefd4993aa286e6800a158531f5baa279f9ecd03575b004d70188efd4d82c693946ef259f5c7f6ca1df27446a24aa4a5239a5d45ead49560afacc11e58aed217cfce4c982df61bf37cad301d3dee71b69169440b03431fd69a3d6407ec7d1481fabac9557fe176d7a7a007bea510ee02ae66c546b2f65c655c0a8e312876789a8c1ab3d0b0cb33b2ee437d5efa9fc4ddfb7e990e96567461fe1bca9c37ff272889ddcb27473a13af60d83c4885b55d4053aa4acb63c95035a266aacf12815cb464ee1cd348d9247697dc9c9c92a1039fa9 public exponent: 10001 ] 2021-10-08 06:51:33.793 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:51:33.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:51:33.796 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-08 06:51:33.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:51:33.797 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-08 06:51:33.798 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:51:33.798 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:51:33.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:51:33.799 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:51:33.800 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:51:33.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:51:33.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:51:33.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:51:33.805 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:51:33.915 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:51:33.917 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:51:33.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:51:33.917 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:51:33.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:51:33.919 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:51:33.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:51:33.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:51:33.920 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:51:33.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:51:33.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:51:33.921 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:51:33.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:51:33.922 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:51:33.923 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:51:33.923 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:51:33.926 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:c1:a0:72:c8:cf:19:79:2d:70:15:c1:81:cf:f5:53:02:e5:50:72] modulus: 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 public exponent: 10001 ] 2021-10-08 06:53:33.397 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:53:33.398 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:53:33.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:53:33.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:53:33.402 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:53:33.402 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:53:33.403 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:53:33.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:53:33.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:53:33.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:53:33.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:53:33.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:53:33.412 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:53:33.412 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:53:33.596 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:53:33.596 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:53:33.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:53:33.597 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:53:33.598 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:53:33.598 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:53:33.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:53:33.598 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:53:33.599 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:53:33.599 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:53:33.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:53:33.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:53:33.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:53:33.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:53:33.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:53:33.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:53:33.604 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:46:6e:15:f0:97:be:5f:fd:a3:f8:a5:aa:35:eb:21:6d:1a:cc:66] modulus: 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 public exponent: 10001 ] 2021-10-08 06:54:02.556 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:54:02.557 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:54:02.558 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:54:02.558 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:54:02.559 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:54:02.559 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:54:02.560 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:54:02.560 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:54:02.560 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:54:02.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:54:02.566 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:54:02.567 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:54:02.567 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:54:02.568 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:54:02.698 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:54:02.699 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:54:02.699 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:54:02.700 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:54:02.701 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:54:02.702 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:54:02.702 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:54:02.703 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:54:02.703 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:54:02.704 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:54:02.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:54:02.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:54:02.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:54:02.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:54:02.707 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:54:02.708 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:54:02.711 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:71:1b:6a:fe:40:73:11:e5:5f:12:13:de:f1:4e:f1:3d:65:f0:29] modulus: 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 public exponent: 10001 ] 2021-10-08 06:55:32.630 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:55:32.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:55:32.633 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:55:32.634 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:55:32.634 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 06:55:32.635 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:55:32.635 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:55:32.635 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:55:32.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:55:32.636 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:55:32.641 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:55:32.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:55:32.642 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:55:32.643 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:55:32.801 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:55:32.802 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:55:32.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:55:32.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:55:32.804 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:55:32.804 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:55:32.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:55:32.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:55:32.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:55:32.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:55:32.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:55:32.806 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:55:32.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:55:32.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:55:32.808 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:55:32.809 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:55:32.812 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:46:e9:24:4e:3a:b1:ea:4c:1d:4b:01:b5:ee:93:92:df:3b:48:cc] modulus: cb7aa5a6a6d67936ed553335577d5ef01c03239025c4ba23d60ad378f8fa128156cfbde69dd988408bb808f4baa69655460afd889cab22c1a56070ee4fa778aeb28e243c1bfc822d26e07bb1bc62a7c8c4c19fad565c05b870c8a37ddeeb22915c695cea02d20e86e28849a541d0d4f47e76f55d894e569a4ec342273dc74ceb3057844c9355af71ac740f973384863072052036b5d913af73756a1deb30a2e12a5c1f2a9f0f1eb0332d9ca2dc99d327faab180ac0e9c9003a98a4472ef0802353b81b5c4f81f8623784ed6caf1dab0af01ee7b8546467f5b577f6c5adadf024e1001606f8354c488e2b8753c1f21c79ca05893e2123384f2d1153cbce381a07 public exponent: 10001 ] 2021-10-08 06:56:13.372 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:56:13.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:56:13.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:56:13.374 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:56:13.374 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 06:56:13.375 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:56:13.375 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:56:13.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:56:13.375 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:56:13.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:56:13.379 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:56:13.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:56:13.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:56:13.380 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:56:13.488 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:56:13.488 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:56:13.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:56:13.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:56:13.490 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:56:13.491 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:56:13.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:56:13.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:56:13.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:56:13.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:56:13.492 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:56:13.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:56:13.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:56:13.494 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:56:13.494 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:56:13.498 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:56:13.503 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:5f:56:5a:c2:48:17:22:e6:5c:52:a3:c1:b4:4a:73:29:95:64:55] modulus: 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 public exponent: 10001 ] 2021-10-08 06:57:25.914 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 06:57:25.915 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 06:57:25.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 06:57:25.918 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 06:57:25.918 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 06:57:25.918 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 06:57:25.919 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 06:57:25.919 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 06:57:25.919 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 06:57:25.920 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 06:57:25.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 06:57:25.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:57:25.924 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 06:57:25.925 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:57:26.046 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 06:57:26.047 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 06:57:26.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 06:57:26.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 06:57:26.049 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 06:57:26.050 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 06:57:26.051 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:57:26.051 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:57:26.051 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:57:26.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:57:26.052 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:57:26.053 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:57:26.053 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 06:57:26.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 06:57:26.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 06:57:26.055 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 06:57:26.058 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:56:57:aa:9a:cf:c0:50:92:4d:3e:b0:eb:30:09:aa:3a:02:50:d3] modulus: dae9b665f374a0861a0a4df447a147a26cf2c44e93d26908e5c6fa44f1ac4e511e6339b7b6d32922f4b674a3aa4db77189694fd3fa33f282e9a2a4e3ca31895257844689787d81ab38befc8c9d9599e97f43da13920026028be36b51422e563ca99c5c97b015e59a181d0382f5e3cef4133a8622332556907dd131352e0339600564be0139964e5b38f3222988e8c47aa983d4aeaea1e68434ea9fa1d8c2e8725ffce75ade503070ab0d65a671d0f6b46da177aafef166fd11738548e1dc019f458cea2e0794cde567c3d41f6714ab4c788e3706e0821c4acd2255ff7b9c417a3d02cae9280f68525c7eaeb8a4a03370d8e845d1ed8560078cbe75e1bd15f625 public exponent: 10001 ] 2021-10-08 07:01:25.988 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 07:01:25.990 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 07:01:25.992 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 07:01:25.993 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 07:01:25.993 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-08 07:01:25.994 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 07:01:25.994 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 07:01:25.994 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 07:01:25.995 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 07:01:25.996 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 07:01:26.005 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 07:01:26.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:01:26.006 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:01:26.007 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:01:26.345 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 07:01:26.346 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 07:01:26.346 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 07:01:26.346 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:01:26.348 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 07:01:26.349 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 07:01:26.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:01:26.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:01:26.349 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:01:26.350 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:01:26.350 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:01:26.351 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:01:26.351 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:01:26.352 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:01:26.352 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:01:26.353 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 07:01:26.356 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:61:68:7a:98:64:3e:66:a1:b1:5e:1e:d1:cc:fc:94:95:5c:35:40] modulus: 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 public exponent: 10001 ] 2021-10-08 07:02:57.570 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 07:02:57.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 07:02:57.573 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 07:02:57.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 07:02:57.574 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-08 07:02:57.575 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 07:02:57.575 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 07:02:57.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 07:02:57.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 07:02:57.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 07:02:57.581 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 07:02:57.581 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:02:57.582 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:02:57.582 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:02:57.698 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 07:02:57.699 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 07:02:57.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 07:02:57.699 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:02:57.700 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 07:02:57.701 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 07:02:57.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:02:57.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:02:57.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:02:57.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:02:57.702 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:02:57.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:02:57.703 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:02:57.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:02:57.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:02:57.705 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 07:02:57.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:b6:55:30:c3:20:8e:f0:ed:8a:62:90:bf:48:3f:ea:2f:0b:5f:9c] modulus: c5719e44395b466bdea08ab6055f08b9d6546750b6a80ea810d46bc6d2918d35ea63228f946aa482357c79ed08332ad62e63076d12456284241e16b4dca63ff32700194fbb9f27948e688f9e1ffaf40393c04c5bef2870db53ae524fbd3d12e3d3eeaaa156d7d4e94dd07c8dab6a252844437d82c1c27ca8ba5ab379dca1f7f514ae9d37ab75185db234394222a22e9b1dd2a10eab93a0b075db90d3d6771ea1250d4ce2aa3c0fc8bc310c839ca0419f390279c30227001aa33673213e3af440d0c65d89a4550990f9ac2ee751c8e8e940f090ed629a4bb77d6e12069f1638b777f58bb00114c21bd73917fe1fd4e164733c7dd698d32188438dda75b3c7541f public exponent: 10001 ] 2021-10-08 07:04:51.674 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 07:04:51.676 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 07:04:51.677 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 07:04:51.678 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 07:04:51.678 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 07:04:51.679 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 07:04:51.679 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 07:04:51.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 07:04:51.679 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 07:04:51.680 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 07:04:51.684 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 07:04:51.685 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:04:51.685 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:04:51.685 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:04:51.820 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 07:04:51.820 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 07:04:51.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 07:04:51.821 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:04:51.822 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 07:04:51.822 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 07:04:51.822 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:51.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:51.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:51.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:51.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:51.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:51.824 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:51.825 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:51.825 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:51.826 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 07:04:51.829 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:0f:d6:fb:b4:00:53:64:66:f1:a8:e7:47:1b:5a:c0:14:61:f2:36] modulus: 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 public exponent: 10001 ] 2021-10-08 07:04:53.067 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-08 07:04:53.068 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-08 07:04:53.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 07:04:53.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-08 07:04:53.070 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-08 07:04:53.071 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-08 07:04:53.072 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-08 07:04:53.072 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-08 07:04:53.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-08 07:04:53.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-08 07:04:53.079 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-08 07:04:53.079 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:04:53.080 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-08 07:04:53.080 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:04:53.163 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-08 07:04:53.164 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-08 07:04:53.164 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-08 07:04:53.165 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-08 07:04:53.166 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-08 07:04:53.166 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-08 07:04:53.166 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:53.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:53.167 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:53.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:53.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:53.168 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:53.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-08 07:04:53.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-08 07:04:53.169 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-08 07:04:53.170 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-08 07:04:53.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 300218151933197195232474570755481514736597951965 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 08 02:26:05 UTC 2021 Final Date: Wed Oct 08 02:26:04 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a6e7594f3812df6f3c3b9314c8836515576748dd 418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5 55b13c78d7e25b7a82e7d93b178c492659832ce1 aeccad8de692230e8b3ebb4e245df3392956d2ca f3f462e2db643be017a2f780d00686f805c432c6 619ec7a4dd040a4db84d9586168158a393bc6cfd c1e3bf0840b342b25eff1f666b9ff037c54a0f19 aa9a7f1496788dc1e1dd15048f7de95734a3c205 fd0463dc78046440fb95379c19c4376a288b3eb8 11d81658fc48c0a67d94f6ab4e4aeae3ee35338b 02e334e8881df27774f3aeac79a92f0dad4edb25 c3e33c2afaf70b538865649a6a8d4ea39af2d189 da7eeee792258f2163e96498c5b131480e845aeb 76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e 91944f84e7f0ba093df87e9adf2cde3b0ad52d71 6fb452bf10ef95e578fefe37ee94da4a758ac21a 0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede e8950e6919627be8106c19a5ffb731e7696bea4d 8ac40ac72e134e234a110ea7c4aabbb8aa216c41 a960d9cf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:0f:d6:fb:b4:00:53:64:66:f1:a8:e7:47:1b:5a:c0:14:61:f2:36] modulus: c018c1b86c11bb83a5b2c0c186fe03b097f86c76e214cb80420ca259cf05ed8070c4a914b2e4d9cce8278bb68f9f5945ac2bbad392597f10dced8f6ee924ec5759e9e0cf0a2bfa96cac7d92f04e9aea78fa8d5090b15d80231d63a3b6d9c637386462a61a08e3ebdeb40bba9193e8e69a434c433562269bcf196f978640bd6da060d1ee22553bc34ced4dea806c90f8e3069b5608ecdb5083c0f08c05c2d22411a0f40d9f4579c38d6ee83dbc0762bf07c61be8afce2fc2f303352d41763819cd470860d3758567d6e6157eac098318b95fe8b7de8e55aa516cc1c3fded90738cbb2d4e3c100555245dbfe87d684a86a879b286ccff9b3d8bb7fa495b34c438f public exponent: 10001 ]