By type
2021-10-19 01:49:09,043 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-19 01:49:14,339 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-19 01:49:17.550 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-10-19 01:49:32.232 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-19 01:49:33.453 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-10-19 01:49:34.236 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-19 01:49:47.157 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 40.408 seconds (JVM running for 48.325) 2021-10-19 01:50:23.235 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 01:50:23.251 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 01:50:23.445 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-19 01:50:23.448 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 01:50:23.546 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-19 01:50:23.635 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 01:50:23.637 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 01:50:23.640 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 01:50:23.641 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 01:50:23.645 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 01:50:23.733 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 01:50:23.737 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 01:50:23.846 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 01:50:23.852 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 01:50:23.853 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 01:50:23.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 01:50:25.558 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 01:50:25.562 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 01:50:25.563 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 01:50:25.633 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 01:50:25.644 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 01:50:25.645 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 01:50:25.646 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 01:50:25.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 01:50:25.647 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 01:50:25.741 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 01:50:25.742 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 01:50:25.743 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 01:50:25.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 01:50:25.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 01:50:25.751 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 01:50:25.753 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 01:50:25.934 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:f8:be:65:5c:48:a3:5d:9d:ce:56:bd:27:83:b9:d8:c1:a4:69:f2] modulus: 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 public exponent: 10001 ] 2021-10-19 04:56:12.122 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 04:56:12.125 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 04:56:12.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-19 04:56:12.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 04:56:12.132 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-19 04:56:12.133 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 04:56:12.134 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 04:56:12.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 04:56:12.135 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 04:56:12.135 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 04:56:12.148 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 04:56:12.149 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 04:56:12.150 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 04:56:12.150 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 04:56:12.398 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 04:56:12.399 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 04:56:12.399 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 04:56:12.400 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 04:56:12.436 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 04:56:12.437 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 04:56:12.438 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:56:12.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:56:12.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:56:12.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:56:12.441 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:56:12.442 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:56:12.442 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:56:12.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:56:12.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:56:12.445 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 04:56:12.449 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:96:d2:d8:54:68:75:c8:24:37:45:0b:d4:eb:d4:9b:d9:20:72:09] modulus: de486f1f78ceeeb9e0b14954b5d86d6022ee07264821ccccac189589ec8942f69495ce124d8a4fd90adddb5e65db0c5fa69c86e990cbe2b7c314e0a7a39b828b2c7ad110f2b979162fcfe77a2c5c5490346d818e93c6b624dc48fad9b9aca6ff4d4ceefa46c15d896e8fbf3e889ab8ac5580aa45365cf94ecd1473293b5496ef6ec96b43642801c282ea4419ec882cc7f6a61d7edf6bbebf9047cbd5275f2b162e0a292a82e6fdaaf419da9a1ffbe00a230a1a48e9ca558de0dfcacdf25abe89dd2eb5b4f0ee74d681c0bbed9622458131de57fb4d42262eb7543d9249d5baf0290d5bb8fede527bb34941a05336b9367a38ece7c264b1919e802a6327021599 public exponent: 10001 ] 2021-10-19 04:58:13.593 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 04:58:13.594 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 04:58:13.595 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-19 04:58:13.596 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 04:58:13.597 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-19 04:58:13.597 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 04:58:13.598 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 04:58:13.598 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 04:58:13.598 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 04:58:13.599 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 04:58:13.636 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 04:58:13.637 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 04:58:13.637 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 04:58:13.638 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 04:58:13.732 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 04:58:13.733 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 04:58:13.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 04:58:13.734 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 04:58:13.737 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 04:58:13.737 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 04:58:13.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:58:13.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:58:13.738 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:58:13.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:58:13.739 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:58:13.740 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:58:13.740 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 04:58:13.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 04:58:13.741 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 04:58:13.742 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 04:58:13.745 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:c2:47:57:25:1b:fb:dc:38:b4:20:89:c5:7c:52:f8:e4:8a:76:01] modulus: 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 public exponent: 10001 ] 2021-10-19 05:01:25.634 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:01:25.635 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:01:25.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-19 05:01:25.637 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:01:25.637 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-19 05:01:25.638 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:01:25.638 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:01:25.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:01:25.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:01:25.639 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:01:25.643 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:01:25.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:25.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:25.644 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:25.752 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:01:25.753 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:01:25.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:01:25.755 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:25.757 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:01:25.757 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:01:25.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:25.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:25.758 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:25.759 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:25.759 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:25.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:25.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:25.761 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:25.762 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:01:25.833 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: b8682e7e9b4094d05c42475c15942ce42706f22b6ae82b52822f1610567e2bdb45a8af5e0477d41ee69cc1919b417f48cdb7718614c0ec4be723372ae3d0b71392a198b85acfc26553707762b0a7df356eea47aa1be0e8a44b2dc1c0f7adc74d7c79968459895037c1ea6fd2758907f9cce270ebfb0fdf22302ff1f12c37915f4734d5ceb71ed48a08a50a02930f0628fe4584b62a52e5a345451c0b23dad9cf8bf3ea12306f6d986adc99fcb5cc4b24b9dea906aaf9f0b9bad1e8f17f51807d8e0805b0a79fbd424825c873dff495dc33ad6e37423f88e9e261add29f8b4d10846a70caf7579909658ef2e34f79c60ba55a72aa8a7fc5ffed5297695ea21d1f1c475deecefad50c44d1f6d600a64d4ff517f8b3c9fdc04d3431da73b6a6f04ed3f5b8995e127dcd45739c0dc4cbb0b377032eac7889145dcc42db406c96dc53e04438c058b26f5bf1ee3022c1cc5e090482d1e6752766d221d6d0e43d08615d96768ac6079beb69ef272a60b3f33768f4778df765c0af849de8d6e6f8103b65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:fb:46:67:e1:e4:d6:a7:73:8a:94:ce:ed:ef:c0:d1:b8:3b:3d:9e] modulus: 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 public exponent: 10001 ] 2021-10-19 05:01:42.052 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:01:42.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:01:42.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-19 05:01:42.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:01:42.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-19 05:01:42.132 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:01:42.132 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:01:42.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:01:42.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:01:42.133 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:01:42.137 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:01:42.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:42.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:42.138 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:42.230 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:01:42.230 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:01:42.231 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:01:42.231 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:42.233 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:01:42.233 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:01:42.234 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:42.234 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:42.234 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:42.235 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:42.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:42.236 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:42.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:42.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:42.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:42.238 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:01:42.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:37:45:21:93:d8:62:b9:60:d5:3b:84:e4:c0:02:7d:a6:53:68:d6] modulus: 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 public exponent: 10001 ] 2021-10-19 05:01:57.182 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:01:57.183 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:01:57.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-19 05:01:57.185 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:01:57.185 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-19 05:01:57.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:01:57.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:01:57.186 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:01:57.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:01:57.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:01:57.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:01:57.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:57.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:01:57.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:57.399 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:01:57.400 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:01:57.400 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:01:57.401 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:01:57.402 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:01:57.403 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:01:57.403 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:57.403 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:57.403 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:57.404 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:57.404 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:57.405 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:57.405 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:01:57.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:01:57.406 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:01:57.407 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:01:57.411 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:a0:88:b1:30:59:81:79:6a:4c:ba:cc:07:21:05:3f:22:8c:94:b8] modulus: bfd6390d8648f8c75b707745c9af4a2e5ce47dffef47e43e8ed2ea2d817da029691bb3085cd5ef49bca4c05e9ee9f036f52dba90857de889ae32b58d81eb05447ad59d0123927a4d81a79185c292b95ba27de3368a50b87382136fe95b16cb55444ef51b1a15900801ca88856ecd062809e3d88aa4a11e773b5a9c3af0083de1c7a9481ff4976c6860928ea676cf6d7c06dd76334edbde736b88a837d8d4bcbb7be96bde6339801b46ab83abbc6bf57e40c7dd43ba404711b603be37952e976e8d1f45afc4b5a1e8f915ab65f80291650a59cb9677f18e28dc3a4ff34f34fc89e326e0d4047587e9b4df2f0fb2370f4660f50e6d6507d3de26fb4a0fb347652b public exponent: 10001 ] 2021-10-19 05:02:31.934 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:02:31.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:02:31.936 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-19 05:02:31.937 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:02:31.937 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-19 05:02:31.938 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:02:31.938 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:02:31.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:02:31.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:02:31.940 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:02:31.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:02:31.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:02:31.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:02:31.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:02:32.126 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:02:32.126 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:02:32.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:02:32.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:02:32.131 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:02:32.132 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:02:32.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:02:32.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:02:32.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:02:32.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:02:32.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:02:32.133 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:02:32.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:02:32.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:02:32.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:02:32.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:02:32.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:f2:9c:45:47:96:c6:33:69:a5:92:4a:4d:ba:dd:b5:3a:a1:75:89] modulus: ecdfaa3fd4b4ece029d43acee12538cb4775d3fa18952e0a5dc10b16c326f7a3255f1868f3820cf5dcef158cecffbca123032a034111dcd2e17028cb38a2e005f292fa8b545547024afbb7c4b9a376f0b0a018bed92515fbc5df35dd67d268eb6afab9052e34477dba38afa077bd532ba28f304c4cf348aadb398a677bbd1d8aed6febc4a4d8a8a23c6a585df85a040e7ae4de981f55115925c513ea3881e8d76c68f2d145ee64bdef1da27c44dcd5bba240826089f91705d0a3640b34a92f6f414ad350a529b0426e9b313fc5d88723979ae78d7876f4131bb2be5729f56ee80abd6d64fd76ec9728eebe74df6ef2f68fcf65793694d9685fe92afae10242d9 public exponent: 10001 ] 2021-10-19 05:04:17.755 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:04:17.756 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:04:17.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-19 05:04:17.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:04:17.758 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-19 05:04:17.759 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:04:17.759 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:04:17.759 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:04:17.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:04:17.760 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:04:17.833 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:04:17.834 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:04:17.835 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:04:17.835 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:04:17.932 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:04:17.933 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:04:17.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:04:17.934 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:04:17.935 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:04:17.935 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:04:17.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:17.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:17.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:17.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:17.938 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:17.938 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:17.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:17.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:17.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:17.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:04:17.943 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: b8682e7e9b4094d05c42475c15942ce42706f22b6ae82b52822f1610567e2bdb45a8af5e0477d41ee69cc1919b417f48cdb7718614c0ec4be723372ae3d0b71392a198b85acfc26553707762b0a7df356eea47aa1be0e8a44b2dc1c0f7adc74d7c79968459895037c1ea6fd2758907f9cce270ebfb0fdf22302ff1f12c37915f4734d5ceb71ed48a08a50a02930f0628fe4584b62a52e5a345451c0b23dad9cf8bf3ea12306f6d986adc99fcb5cc4b24b9dea906aaf9f0b9bad1e8f17f51807d8e0805b0a79fbd424825c873dff495dc33ad6e37423f88e9e261add29f8b4d10846a70caf7579909658ef2e34f79c60ba55a72aa8a7fc5ffed5297695ea21d1f1c475deecefad50c44d1f6d600a64d4ff517f8b3c9fdc04d3431da73b6a6f04ed3f5b8995e127dcd45739c0dc4cbb0b377032eac7889145dcc42db406c96dc53e04438c058b26f5bf1ee3022c1cc5e090482d1e6752766d221d6d0e43d08615d96768ac6079beb69ef272a60b3f33768f4778df765c0af849de8d6e6f8103b65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:48:5d:be:0b:34:ba:1b:fc:51:cd:94:50:c0:a0:14:73:ea:62:a4] modulus: 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 public exponent: 10001 ] 2021-10-19 05:04:18.339 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-10-19 05:04:18.340 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-10-19 05:04:18.341 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-19 05:04:18.342 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-19 05:04:18.342 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-19 05:04:18.342 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-10-19 05:04:18.343 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-10-19 05:04:18.343 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-10-19 05:04:18.343 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-10-19 05:04:18.343 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-10-19 05:04:18.347 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-10-19 05:04:18.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:04:18.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-10-19 05:04:18.348 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:04:18.412 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-10-19 05:04:18.431 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-10-19 05:04:18.432 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-10-19 05:04:18.432 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-10-19 05:04:18.434 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-10-19 05:04:18.434 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-10-19 05:04:18.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:18.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:18.435 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:18.436 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:18.436 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:18.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:18.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-19 05:04:18.437 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-10-19 05:04:18.438 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-10-19 05:04:18.438 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-19 05:04:18.441 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 553434582397690916894116589663980763329107350851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 19 01:44:54 UTC 2021 Final Date: Sun Oct 19 01:44:53 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [30:0b:45:cc:be:7c:94:91:fa:8b:1c:0c:48:df:06:73:8c:62:23:1f] modulus: b8682e7e9b4094d05c42475c15942ce42706f22b6ae82b52822f1610567e2bdb45a8af5e0477d41ee69cc1919b417f48cdb7718614c0ec4be723372ae3d0b71392a198b85acfc26553707762b0a7df356eea47aa1be0e8a44b2dc1c0f7adc74d7c79968459895037c1ea6fd2758907f9cce270ebfb0fdf22302ff1f12c37915f4734d5ceb71ed48a08a50a02930f0628fe4584b62a52e5a345451c0b23dad9cf8bf3ea12306f6d986adc99fcb5cc4b24b9dea906aaf9f0b9bad1e8f17f51807d8e0805b0a79fbd424825c873dff495dc33ad6e37423f88e9e261add29f8b4d10846a70caf7579909658ef2e34f79c60ba55a72aa8a7fc5ffed5297695ea21d1f1c475deecefad50c44d1f6d600a64d4ff517f8b3c9fdc04d3431da73b6a6f04ed3f5b8995e127dcd45739c0dc4cbb0b377032eac7889145dcc42db406c96dc53e04438c058b26f5bf1ee3022c1cc5e090482d1e6752766d221d6d0e43d08615d96768ac6079beb69ef272a60b3f33768f4778df765c0af849de8d6e6f8103b65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2e5d0ab5cde2a1c44f24f51ffbef9c9e7d45ac5b 8105f2cb0043da447fc11a6de619e490fa41337d 7a4514b82ac5cb0c10fe8e426e8c2481d521d57c a2ca2c3607d6e76ce2ba9e0ae9c211b2073d6c2f da3c675d83e98ae490a40850a22595c1dfa77451 a873e536778e0c1e292d8412ea81e5dec34c048b c13a648bcdb941f8a068d778b5408583ee2af4f9 36760e11fa02d487ce244c36153c99c0254a1894 5067338fe131c6f1c71f6fca8533081aa0f98050 080edff71be6b7c1d6fee1a96129c87c5437ca0a b7568768231930eaebd2b3348abf908b2a4c37b9 7d4340d47d9aaa221c07e3c99f8b72c727a4734e cb1228127b0cbf686381c553955022d590e9e33b 8d73972da46ecf28b5dd09e7d4a3648516db116d babd8cd108fd313609e69cede591842f5432d681 56bfd074ecfab305c1bdcbf499e09a5d56b80e1d c601ad7dc6aaf1ee6a4b6295cbd7566efa2f0de9 4a8348111355200fa11ca1c1b29d00a538d36930 8cd2fd4a874c639c2b3b959e235aafb8eefe73cf 1353eda8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:e0:9e:c1:0f:f4:c7:69:f6:ac:39:2e:d5:e7:54:a6:92:42:5c:24] modulus: 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 public exponent: 10001 ]