By type
2021-11-08 01:58:03,839 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-08 01:58:08,838 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-08 01:58:11.946 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-08 01:58:26.238 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-08 01:58:27.552 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-08 01:58:28.158 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-08 01:58:40.347 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 38.799 seconds (JVM running for 46.898) 2021-11-08 02:01:26.244 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 02:01:26.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 02:01:26.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-08 02:01:26.544 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 02:01:26.645 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-08 02:01:26.648 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 02:01:26.731 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 02:01:26.735 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 02:01:26.736 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 02:01:26.739 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 02:01:26.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 02:01:26.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 02:01:26.939 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 02:01:26.944 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 02:01:26.944 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 02:01:26.947 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 02:01:28.531 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 02:01:28.534 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 02:01:28.535 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 02:01:28.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 02:01:28.545 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 02:01:28.546 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 02:01:28.547 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 02:01:28.547 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 02:01:28.548 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 02:01:28.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 02:01:28.639 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 02:01:28.640 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 02:01:28.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 02:01:28.648 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 02:01:28.649 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 02:01:28.651 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 02:01:28.849 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:ea:6a:13:e6:06:d9:fb:5d:2d:98:35:c8:ac:99:e7:ee:42:c3:8a] modulus: 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 public exponent: 10001 ] 2021-11-08 05:08:46.110 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:08:46.112 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:08:46.114 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 05:08:46.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:08:46.117 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-08 05:08:46.118 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:08:46.119 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:08:46.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:08:46.120 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:08:46.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:08:46.149 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:08:46.151 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:08:46.152 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:08:46.152 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:08:46.393 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:08:46.431 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:08:46.432 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:08:46.433 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:08:46.436 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:08:46.437 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:08:46.437 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:08:46.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:08:46.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:08:46.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:08:46.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:08:46.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:08:46.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:08:46.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:08:46.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:08:46.445 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:08:46.449 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:2a:53:b0:72:0d:00:8c:08:53:b6:17:6f:c0:f4:6a:54:e3:5d:c5] modulus: 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 public exponent: 10001 ] 2021-11-08 05:10:23.209 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:10:23.210 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:10:23.212 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 05:10:23.212 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:10:23.213 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 05:10:23.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:10:23.214 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:10:23.215 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:10:23.215 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:10:23.216 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:10:23.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:10:23.238 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:10:23.238 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:10:23.239 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:10:23.450 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:10:23.450 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:10:23.451 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:10:23.451 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:10:23.453 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:10:23.454 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:10:23.454 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:10:23.455 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:10:23.455 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:10:23.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:10:23.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:10:23.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:10:23.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:10:23.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:10:23.457 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:10:23.458 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:10:23.533 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: c04db1d41729040f033b6c958c1d550dac40631811b81a54ec80ed59bbb058290b8852c188f37ad9cb3a117a5479620c89d495c1e1afc4f8f7450c367e4b790d9db6174b5193af9953ca312b3fe3fa0a40afe804590626bbe683cafa6c9b643e3cc73cf96b2dd8ea7abd2b2b84380846554df8c8052d86bc9d150399a1e7a67f9e993b13e4e6c7e58425decfb42b0a775fe74796ca04327d494866718566d9d5c975234b874c17ce09cb260242de7988afac8e398d9aee2e1888f6831e08c0eed8f10afa5f04c9e7422993eb070956fd839d4ba588926f7a8d3b6c509b1d64b1f176f5ee94d7d78f2bb708999012e691d1698b0c5258b58130ffb120f1e980c849299304afccd4fbc1a92f7773f6d76a5c792a9673c7f93b09d9f43d967d3d4b2e3033dfee874dc23e489d1b402301bdebde805f2d653a305f06aa20ec03f00dc256e75d1b937970fdeaeccede9dd5f5edd12094ee5911137a1b47fce3708917fabb0dac25af5e0043109f90651746c308c9069e31af5be87146f17a5c0c502d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:13:e8:2f:a3:d1:25:a7:78:c4:24:e8:80:3f:32:58:2e:b3:91:a4] modulus: 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 public exponent: 10001 ] 2021-11-08 05:13:15.320 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:13:15.321 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:13:15.323 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 05:13:15.324 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:13:15.325 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 05:13:15.326 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:13:15.326 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:13:15.326 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:13:15.327 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:13:15.327 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:13:15.333 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:13:15.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:13:15.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:13:15.334 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:13:15.532 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:13:15.533 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:13:15.533 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:13:15.534 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:13:15.536 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:13:15.536 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:13:15.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:15.537 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:15.538 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:15.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:15.539 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:15.540 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:15.540 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:15.541 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:15.541 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:15.542 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:13:15.545 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: c04db1d41729040f033b6c958c1d550dac40631811b81a54ec80ed59bbb058290b8852c188f37ad9cb3a117a5479620c89d495c1e1afc4f8f7450c367e4b790d9db6174b5193af9953ca312b3fe3fa0a40afe804590626bbe683cafa6c9b643e3cc73cf96b2dd8ea7abd2b2b84380846554df8c8052d86bc9d150399a1e7a67f9e993b13e4e6c7e58425decfb42b0a775fe74796ca04327d494866718566d9d5c975234b874c17ce09cb260242de7988afac8e398d9aee2e1888f6831e08c0eed8f10afa5f04c9e7422993eb070956fd839d4ba588926f7a8d3b6c509b1d64b1f176f5ee94d7d78f2bb708999012e691d1698b0c5258b58130ffb120f1e980c849299304afccd4fbc1a92f7773f6d76a5c792a9673c7f93b09d9f43d967d3d4b2e3033dfee874dc23e489d1b402301bdebde805f2d653a305f06aa20ec03f00dc256e75d1b937970fdeaeccede9dd5f5edd12094ee5911137a1b47fce3708917fabb0dac25af5e0043109f90651746c308c9069e31af5be87146f17a5c0c502d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:5b:8c:13:82:58:5a:16:38:cb:53:d0:f1:14:54:9d:01:55:3e:96] modulus: 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 public exponent: 10001 ] 2021-11-08 05:13:34.100 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:13:34.102 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:13:34.103 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 05:13:34.104 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:13:34.104 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-08 05:13:34.105 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:13:34.131 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:13:34.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:13:34.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:13:34.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:13:34.140 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:13:34.141 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:13:34.141 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:13:34.141 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:13:34.225 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:13:34.225 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:13:34.231 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:13:34.231 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:13:34.233 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:13:34.233 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:13:34.234 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:34.234 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:34.235 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:34.236 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:34.236 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:34.236 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:34.237 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:13:34.237 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:13:34.238 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:13:34.238 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:13:34.242 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:ad:14:5c:3f:e0:cf:53:80:9e:7f:22:97:ea:97:27:3c:12:95:e5] modulus: 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 public exponent: 10001 ] 2021-11-08 05:14:06.509 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:14:06.511 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:14:06.512 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 05:14:06.512 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:14:06.513 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-08 05:14:06.513 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:14:06.514 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:14:06.514 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:14:06.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:14:06.515 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:14:06.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:14:06.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:14:06.520 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:14:06.521 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:14:06.612 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:14:06.612 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:14:06.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:14:06.613 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:14:06.631 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:14:06.632 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:14:06.632 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:06.632 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:06.632 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:06.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:06.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:06.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:06.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:06.635 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:14:06.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:bd:4a:ed:e6:f3:cb:5d:39:ed:7f:ea:46:d9:f2:69:d1:66:86:e8] modulus: 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 public exponent: 10001 ] 2021-11-08 05:14:39.963 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:14:39.965 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:14:39.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 05:14:39.967 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:14:39.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-08 05:14:39.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:14:39.969 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:14:39.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:14:39.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:14:39.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:14:39.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:14:40.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:14:40.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:14:40.032 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:14:40.129 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:14:40.131 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:14:40.132 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:14:40.132 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:14:40.134 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:14:40.134 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:14:40.135 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:40.135 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:40.136 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:40.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:40.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:40.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:40.138 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:14:40.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:14:40.139 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:14:40.140 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:14:40.142 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:ae:50:d7:7e:b5:34:83:c6:1e:ed:da:20:00:02:04:80:95:0b:3a] modulus: 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 public exponent: 10001 ] 2021-11-08 05:16:06.959 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:16:06.960 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:16:06.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-08 05:16:06.962 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:16:06.963 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-08 05:16:06.963 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:16:06.964 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:16:06.964 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:16:06.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:16:06.965 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:16:06.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:16:06.972 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:16:06.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:16:06.973 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:16:07.134 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:16:07.135 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:16:07.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:16:07.135 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:16:07.137 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:16:07.137 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:16:07.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:07.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:07.138 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:07.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:07.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:07.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:07.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:07.141 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:07.141 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:07.142 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:16:07.145 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:e2:ec:de:c3:70:22:01:41:ed:f6:57:66:74:71:71:22:ce:2e:b3] modulus: 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 public exponent: 10001 ] 2021-11-08 05:16:25.764 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-08 05:16:25.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-08 05:16:25.766 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 05:16:25.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-08 05:16:25.767 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-08 05:16:25.767 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-08 05:16:25.768 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-08 05:16:25.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-08 05:16:25.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-08 05:16:25.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-08 05:16:25.773 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-08 05:16:25.773 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:16:25.773 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-08 05:16:25.774 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:16:25.862 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-08 05:16:25.863 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-08 05:16:25.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-08 05:16:25.863 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-08 05:16:25.865 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-08 05:16:25.866 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-08 05:16:25.866 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:25.867 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:25.867 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:25.868 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:25.868 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:25.868 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:25.869 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-08 05:16:25.869 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-08 05:16:25.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-08 05:16:25.870 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-08 05:16:25.874 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 39841132761934542190408590298459203539465127959 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 08 01:54:38 UTC 2021 Final Date: Sat Nov 08 01:54:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e e4519fa7a031445325a4870d7b8a407c72cb2d5f 65f5e73f8bdd3a913db9cb373e4ac398cb6e0275 603675a9b0de5821eafe8206daeb5bf78f8681b8 5a52d448fa38a243f7575dc140b7786db136e24b 23f55c752b5a26730d4e5d9f8a103db13c63bb5b f119464727640c9d617201c6e835cb4c7d4ae125 c06adf5891e0649d66535f0e3525bbce7034e285 6079e1c5e6c1409957c72c863a432b246479d12a cce1c5fd98097b9c32ed6ed995cde18621029b31 7158662c738c3e5a3954537a9051bef29c5b60bb 55879779354ebb8e2663c0a82811b134169e1726 7b18e5bd6f88c57bce3b156e777a8a240c86eb10 0151a7b97f32fa781fea14bb3c2e51cc882c639e 832f7f653f3bf10f5f88cc18c24cb20ce5ffd742 6a070c28a9fcc10b246d497075543f8f801a1620 adc3eeaaf30718b408fcaed7b745e0bbf9e27b07 60910b2e11c614a7cd1c5776726359c97a84236b d45f9631d6fa7da94489779b5f6a594a4dd8f311 54674b66 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:ef:c0:55:f4:e2:a8:01:60:dc:93:c1:c3:a4:07:61:46:f7:fe:9c] modulus: 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 public exponent: 10001 ]