By type
2021-10-15 11:07:54,997 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-15 11:08:00,493 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-15 11:08:06.004 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-15 11:08:23.495 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-15 11:08:25.005 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-15 11:08:26.495 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-15 11:08:42.893 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 50.894 seconds (JVM running for 60.598) 2021-10-15 11:09:19.389 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 11:09:19.400 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 11:09:19.604 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-15 11:09:19.609 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 11:09:19.796 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-15 11:09:19.800 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 11:09:19.801 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 11:09:19.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 11:09:19.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 11:09:19.891 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 11:09:19.899 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 11:09:19.903 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 11:09:20.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 11:09:20.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 11:09:20.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 11:09:20.205 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 11:09:22.400 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 11:09:22.488 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 11:09:22.489 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 11:09:22.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 11:09:22.588 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 11:09:22.589 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 11:09:22.590 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 11:09:22.591 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 11:09:22.591 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 11:09:22.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 11:09:22.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 11:09:22.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 11:09:22.704 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 11:09:22.785 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 11:09:22.787 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 11:09:22.789 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 11:09:22.997 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:6b:4b:2c:35:42:04:4c:4a:47:b7:37:80:f3:a4:d8:be:f6:07:0f] modulus: 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 public exponent: 10001 ] 2021-10-15 15:56:25.499 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 15:56:25.586 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 15:56:25.589 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 15:56:25.591 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 15:56:25.593 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 15:56:25.686 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 15:56:25.688 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 15:56:25.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 15:56:25.690 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 15:56:25.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 15:56:25.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 15:56:25.809 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 15:56:25.810 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 15:56:25.886 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 15:56:26.187 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 15:56:26.192 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 15:56:26.193 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 15:56:26.194 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 15:56:26.199 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 15:56:26.200 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 15:56:26.201 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:56:26.201 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:56:26.201 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:56:26.203 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:56:26.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:56:26.204 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:56:26.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:56:26.206 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:56:26.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:56:26.209 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 15:56:26.288 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:7b:ce:e2:ef:ef:28:2f:1d:e6:23:fe:15:55:c1:68:60:40:52:04] modulus: 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 public exponent: 10001 ] 2021-10-15 15:58:13.487 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 15:58:13.489 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 15:58:13.492 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 15:58:13.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 15:58:13.494 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 15:58:13.496 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 15:58:13.496 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 15:58:13.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 15:58:13.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 15:58:13.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 15:58:13.592 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 15:58:13.593 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 15:58:13.593 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 15:58:13.594 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 15:58:13.920 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 15:58:13.922 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 15:58:13.922 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 15:58:13.923 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 15:58:13.933 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 15:58:13.934 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 15:58:13.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:58:13.936 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:58:13.986 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:58:13.988 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:58:13.988 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:58:13.989 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:58:13.990 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 15:58:13.991 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 15:58:13.991 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 15:58:13.992 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 15:58:14.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:91:f3:1d:2a:4f:33:f9:61:80:5b:38:3d:8a:68:63:6a:f8:e2:85] modulus: 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 public exponent: 10001 ] 2021-10-15 16:01:18.841 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:01:18.887 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:01:18.889 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 16:01:18.890 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:01:18.891 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 16:01:18.892 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:01:18.893 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:01:18.893 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:01:18.894 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:01:18.895 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:01:18.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:01:18.985 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:01:18.986 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:01:18.987 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:01:19.214 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:01:19.215 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:01:19.216 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:01:19.216 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:01:19.217 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:01:19.218 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:01:19.218 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:19.219 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:19.219 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:19.220 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:19.220 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:19.221 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:19.222 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:19.222 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:19.223 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:19.224 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:01:19.228 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:54:f3:35:34:19:c6:3f:5e:96:9d:26:0b:29:8e:a2:80:ca:d2:15] modulus: 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 public exponent: 10001 ] 2021-10-15 16:01:55.135 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:01:55.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:01:55.138 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:01:55.139 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:01:55.140 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:01:55.141 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:01:55.141 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:01:55.141 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:01:55.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:01:55.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:01:55.189 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:01:55.190 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:01:55.190 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:01:55.191 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:01:55.492 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:01:55.493 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:01:55.494 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:01:55.500 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:01:55.502 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:01:55.503 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:01:55.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:55.505 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:55.506 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:55.685 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:55.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:55.686 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:55.687 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:01:55.688 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:01:55.688 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:01:55.689 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:01:55.693 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:cb:64:af:ee:0a:8a:23:aa:ee:66:a6:72:55:2f:5b:4d:09:ee:f0] modulus: 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 public exponent: 10001 ] 2021-10-15 16:06:59.734 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:06:59.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:06:59.738 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:06:59.739 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:06:59.739 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:06:59.740 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:06:59.740 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:06:59.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:06:59.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:06:59.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:06:59.793 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:06:59.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:06:59.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:06:59.795 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:07:00.062 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:07:00.086 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:07:00.086 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:07:00.087 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:07:00.089 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:07:00.089 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:07:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:07:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:07:00.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:07:00.091 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:07:00.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:07:00.092 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:07:00.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:07:00.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:07:00.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:07:00.095 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:07:00.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:15:09:99:83:5c:e2:69:ea:9e:de:81:ce:28:2a:fb:68:8f:8b:8f] modulus: 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 public exponent: 10001 ] 2021-10-15 16:08:13.729 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:08:13.731 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:08:13.734 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 16:08:13.734 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:08:13.735 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-15 16:08:13.735 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:08:13.735 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:08:13.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:08:13.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:08:13.736 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:08:13.790 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:08:13.794 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:08:13.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:08:13.797 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:08:16.264 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:08:16.265 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:08:16.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:08:16.265 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:08:16.267 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:08:16.268 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:08:16.268 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:08:16.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:08:16.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:08:16.269 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:08:16.270 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:08:16.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:08:16.271 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:08:16.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:08:16.272 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:08:16.276 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:08:16.281 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:8d:08:7f:2c:77:14:de:d3:ed:0a:61:06:6b:04:9d:93:bc:cc:b0] modulus: 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 public exponent: 10001 ] 2021-10-15 16:09:03.860 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:09:03.861 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:09:03.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:09:03.864 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:09:03.865 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:09:03.865 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:09:03.866 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:09:03.885 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:09:03.886 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:09:03.887 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:09:03.904 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:09:03.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:09:03.986 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:09:03.987 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:09:04.448 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:09:04.449 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:09:04.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:09:04.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:09:04.459 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:09:04.460 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:09:04.461 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:04.461 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:04.461 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:04.462 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:04.462 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:04.462 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:04.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:04.463 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:04.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:04.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:09:04.468 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:e9:53:a5:56:cc:a0:65:89:22:64:b1:3f:1c:4d:3a:7a:8b:a5:88] modulus: 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 public exponent: 10001 ] 2021-10-15 16:09:24.066 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:09:24.068 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:09:24.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:09:24.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:09:24.080 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:09:24.084 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:09:24.085 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:09:24.086 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:09:24.086 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:09:24.087 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:09:24.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:09:24.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:09:24.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:09:24.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:09:24.428 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:09:24.429 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:09:24.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:09:24.430 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:09:24.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:09:24.433 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:09:24.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:24.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:24.435 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:24.436 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:24.437 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:24.449 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:24.452 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:09:24.452 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:09:24.453 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:09:24.453 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:09:24.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:ef:78:4c:05:59:5e:98:f9:88:b8:0d:82:30:ac:73:e4:7c:08:ec] modulus: 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 public exponent: 10001 ] 2021-10-15 16:11:00.135 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:11:00.136 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:11:00.137 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:11:00.138 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:11:00.138 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:11:00.139 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:11:00.139 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:11:00.140 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:11:00.140 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:11:00.140 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:11:00.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:11:00.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:11:00.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:11:00.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:11:00.428 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:11:00.428 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:11:00.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:11:00.429 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:11:00.430 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:11:00.431 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:11:00.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:11:00.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:11:00.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:11:00.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:11:00.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:11:00.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:11:00.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:11:00.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:11:00.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:11:00.435 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:11:00.437 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:96:02:90:91:77:bc:bc:89:7b:6f:b0:f2:1d:60:e9:1e:ff:56:dd] modulus: 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 public exponent: 10001 ] 2021-10-15 16:13:38.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:13:38.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:13:38.319 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:13:38.320 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:13:38.320 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:13:38.321 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:13:38.321 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:13:38.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:13:38.322 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:13:38.323 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:13:38.330 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:13:38.331 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:13:38.331 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:13:38.331 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:13:38.629 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:13:38.629 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:13:38.630 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:13:38.630 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:13:38.632 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:13:38.632 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:13:38.632 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:38.633 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:38.633 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:38.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:38.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:38.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:38.635 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:38.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:38.636 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:38.637 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:13:38.640 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:fa:da:91:e3:16:59:42:4a:6d:d7:67:8d:a9:b2:94:75:cb:f1:e1] modulus: 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 public exponent: 10001 ] 2021-10-15 16:13:49.143 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:13:49.144 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:13:49.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-15 16:13:49.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:13:49.147 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-15 16:13:49.147 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:13:49.147 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:13:49.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:13:49.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:13:49.148 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:13:49.154 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:13:49.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:13:49.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:13:49.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:13:49.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:13:49.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:13:49.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:13:49.442 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:13:49.443 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:13:49.444 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:13:49.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:49.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:49.444 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:49.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:49.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:49.445 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:49.446 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:13:49.446 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:13:49.446 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:13:49.447 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:13:49.450 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:b4:75:df:26:f2:12:d4:23:98:b1:45:5f:a1:a5:d2:aa:97:66:b1] modulus: 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 public exponent: 10001 ] 2021-10-15 16:14:23.391 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:14:23.392 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:14:23.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-15 16:14:23.394 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:14:23.394 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-15 16:14:23.395 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:14:23.395 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:14:23.395 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:14:23.397 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:14:23.398 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:14:23.405 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:14:23.406 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:14:23.406 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:14:23.407 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:14:23.663 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:14:23.663 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:14:23.663 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:14:23.664 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:14:23.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:14:23.665 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:14:23.671 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:14:23.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:14:23.672 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:14:23.674 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:14:23.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:14:23.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:14:23.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:14:23.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:14:23.676 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:14:23.677 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:14:23.681 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:92:c0:4e:82:49:15:7b:51:68:70:76:d6:7b:73:cc:3a:fb:15:d2] modulus: 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 public exponent: 10001 ] 2021-10-15 16:15:37.816 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:15:37.817 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:15:37.818 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:15:37.820 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:15:37.821 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:15:37.821 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:15:37.822 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:15:37.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:15:37.822 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:15:37.823 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:15:37.829 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:15:37.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:15:37.885 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:15:37.886 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:15:38.044 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:15:38.045 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:15:38.045 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:15:38.045 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:15:38.047 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:15:38.047 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:15:38.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:15:38.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:15:38.048 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:15:38.049 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:15:38.049 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:15:38.049 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:15:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:15:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:15:38.050 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:15:38.051 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:15:38.054 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:5c:37:fb:a2:77:7a:e6:e1:4a:e4:5b:7a:11:d2:c2:83:8c:d6:d5] modulus: ce2a2481ff9ffa0d6fa94e4a6c263b77993b75da27ccf4a320035e22def87e8c5d0fd470ac696b017089d7511a935048e9e7c774f4989c2554cbb86aa45cd35321f2dec1a4afd2495b76c328d5015ca19b163c76a0b88e8431b6be853b561b51fd3c699dec3ce7fd3f4eec303c147d22d69645a27c8b27139be793a45d989aabbf16cd9a0828d5eb0c0125f8dcd0253ce0d3543b45407d007c7143f26dfdb82a41f237ba18f0300d2db5ecd3434d63295d2d22efb91a1122e0d5a1e298574c0826177c07e55a22cf4ddac1d46199f9689af54a64c7d27d5d934f740cb0fc788a88ffb01d8a79084fc695ecc3f39bdb1edce5b04b9740fa4dff91493afa8c7561 public exponent: 10001 ] 2021-10-15 16:16:49.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:16:49.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:16:49.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:16:49.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:16:49.994 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-15 16:16:49.995 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:16:49.998 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:16:49.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:16:49.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:16:49.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:16:50.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:16:50.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:16:50.006 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:16:50.006 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:16:50.148 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:16:50.149 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:16:50.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:16:50.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:16:50.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:16:50.151 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:16:50.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:16:50.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:16:50.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:16:50.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:16:50.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:16:50.153 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:16:50.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:16:50.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:16:50.154 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:16:50.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:16:50.158 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:12:4e:17:4c:be:26:79:02:7d:61:6f:d4:b3:a2:9f:34:0c:08:9b] modulus: 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 public exponent: 10001 ] 2021-10-15 16:17:10.225 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:17:10.226 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:17:10.227 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:17:10.228 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:17:10.228 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-15 16:17:10.229 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:17:10.229 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:17:10.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:17:10.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:17:10.230 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:17:10.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:17:10.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:17:10.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:17:10.285 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:17:10.464 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:17:10.465 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:17:10.465 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:17:10.466 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:17:10.467 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:17:10.467 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:17:10.468 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:17:10.468 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:17:10.468 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:17:10.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:17:10.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:17:10.469 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:17:10.470 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:17:10.470 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:17:10.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:17:10.474 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:17:10.477 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:1b:55:e9:db:ae:8f:25:87:1e:52:53:32:ef:c8:0f:57:f1:3f:6a] modulus: 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 public exponent: 10001 ] 2021-10-15 16:19:25.212 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-15 16:19:25.214 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-15 16:19:25.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:19:25.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-15 16:19:25.216 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-15 16:19:25.216 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-15 16:19:25.217 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-15 16:19:25.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-15 16:19:25.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-15 16:19:25.218 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-15 16:19:25.228 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-15 16:19:25.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:19:25.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-15 16:19:25.230 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:19:25.509 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-15 16:19:25.510 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-15 16:19:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-15 16:19:25.511 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-15 16:19:25.512 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-15 16:19:25.512 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-15 16:19:25.513 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:19:25.513 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:19:25.513 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:19:25.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:19:25.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:19:25.514 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:19:25.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-15 16:19:25.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-15 16:19:25.515 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-15 16:19:25.516 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-15 16:19:25.519 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 465408111461636177323576185355031142758104429390 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 15 11:02:40 UTC 2021 Final Date: Wed Oct 15 11:02:39 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e ec1022233af88bd6663f4fc3ad010c1f7b5602dd 644c9919eef260062ea8fb9a53700f86f4bfebf5 dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d d79c00116559c2f0bf21e87fa0fc4f7981000b43 f882029274b50a198b9ce328ef49203d37ff224b 1ccce8c454570e293ca26baa7d10d5d41d690f3b 376341b9997cd3dae1e7a4f2ea5bce3ffa602c57 bfc7a54687cbcff59dfa428de07d3353587ac67c 6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d aa2753d362349610963d4d114135c77b1464b25d b0043e4f4e72291639b761bf1b9ef46b5a45d841 e30bfa5f33b8b251ceecb7a0d23938937e8ccf54 4b6f121fc69025e0390f23c9884cd313c095580e 01afa402944b8d2851bb0d005ec7415897de547c c83a35f9320e19e593b445301bd0cedd3d7e0b3e 2022f7fd2b04d136ea8189334796a28120df33c1 9ed6d52d322baf8bdaa8af8bb486d12ce702a56e 6d7042493fd5c2e800dbbf078f7b18e0d7e5c090 4056902f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:a5:ff:10:e9:dd:e5:43:f3:b3:f0:5a:fb:54:10:51:c2:74:32:ee] modulus: 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 public exponent: 10001 ]