By type
2021-11-10 01:37:16,777 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-10 01:37:20,374 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-10 01:37:22.765 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-10 01:37:34.087 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-10 01:37:35.069 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-10 01:37:35.678 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-10 01:37:45.469 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 30.579 seconds (JVM running for 36.823) 2021-11-10 01:38:03.766 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 01:38:03.779 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 01:38:03.888 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-10 01:38:03.891 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 01:38:03.973 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-10 01:38:03.977 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 01:38:03.977 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 01:38:03.980 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 01:38:03.981 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 01:38:03.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 01:38:04.069 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 01:38:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 01:38:04.183 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 01:38:04.187 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 01:38:04.188 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 01:38:04.265 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 01:38:05.527 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 01:38:05.530 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 01:38:05.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 01:38:05.533 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 01:38:05.570 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 01:38:05.572 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 01:38:05.572 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 01:38:05.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 01:38:05.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 01:38:05.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 01:38:05.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 01:38:05.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 01:38:05.674 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 01:38:05.674 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 01:38:05.675 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 01:38:05.676 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 01:38:05.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:0a:78:61:92:97:70:70:a2:b5:93:a1:da:d3:05:04:44:47:5b:35] modulus: 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 public exponent: 10001 ] 2021-11-10 03:10:00.349 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:10:00.351 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:10:00.354 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-10 03:10:00.355 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:10:00.357 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-10 03:10:00.358 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:10:00.358 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:10:00.359 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:10:00.359 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:10:00.363 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:10:00.373 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:10:00.374 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:10:00.374 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:10:00.375 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:10:00.563 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:10:00.564 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:10:00.564 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:10:00.564 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:10:00.567 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:10:00.568 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:10:00.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:10:00.569 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:10:00.569 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:10:00.570 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:10:00.570 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:10:00.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:10:00.571 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:10:00.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:10:00.572 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:10:00.573 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:10:00.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:73:8c:2f:b3:78:ea:68:2f:3d:86:03:b1:4c:a6:8d:0d:0a:9b:64] modulus: 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 public exponent: 10001 ] 2021-11-10 03:11:45.717 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:11:45.718 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:11:45.720 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 03:11:45.721 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:11:45.721 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 03:11:45.722 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:11:45.723 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:11:45.724 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:11:45.724 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:11:45.725 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:11:45.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:11:45.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:11:45.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:11:45.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:11:45.860 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:11:45.861 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:11:45.863 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:11:45.863 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:11:45.865 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:11:45.865 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:11:45.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:11:45.866 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:11:45.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:11:45.867 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:11:45.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:11:45.868 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:11:45.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:11:45.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:11:45.869 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:11:45.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:11:45.873 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:df:df:96:85:d2:ca:94:e3:ef:44:5c:d2:74:c3:cb:99:96:31:64] modulus: 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 public exponent: 10001 ] 2021-11-10 03:14:18.142 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:14:18.143 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:14:18.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 03:14:18.145 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:14:18.146 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 03:14:18.146 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:14:18.147 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:14:18.147 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:14:18.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:14:18.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:14:18.153 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:14:18.153 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:14:18.154 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:14:18.154 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:14:18.279 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:14:18.280 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:14:18.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:14:18.281 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:14:18.282 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:14:18.283 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:14:18.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:18.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:18.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:18.285 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:18.285 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:18.286 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:18.286 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:18.287 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:18.287 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:18.288 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:14:18.291 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:c2:4e:52:e2:14:72:57:37:b9:f2:07:b2:ae:0d:d1:c0:d0:9e:5e] modulus: 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 public exponent: 10001 ] 2021-11-10 03:14:43.188 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:14:43.189 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:14:43.190 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 03:14:43.191 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:14:43.191 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 03:14:43.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:14:43.192 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:14:43.193 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:14:43.193 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:14:43.194 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:14:43.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:14:43.198 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:14:43.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:14:43.199 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:14:43.348 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:14:43.349 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:14:43.350 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:14:43.350 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:14:43.351 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:14:43.351 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:14:43.352 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:43.352 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:43.352 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:43.353 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:43.363 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:43.363 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:43.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:14:43.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:14:43.364 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:14:43.365 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:14:43.368 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: a3c3959f672bf5edde0625006791cf28463d1fd14974c46f17f3f89b2fe3a7980e67ab2676dc6e8987fbe20020ae292a7d20f75e80c239c5a19326eacff3e66355ed0bc2b4574977525478f48859ee57bf5f748ebde0b93a1f6c5136433a539ec2739eb6141a30bfe8b7d55afd028d8cd3077e12263c56bdd3d0bd75606f65241e16830a6a7284c8ee34ce0310cb335d91a3ee7dde77ce540af05f0ca9d9cde3b037c689b1b1682904265b21d931309af3090ed40141630426b196584e61fa6f496cc8a4ad74079bd000ac5bf8675391d13047705b4a39ae31e689bc6f5e9e7c61550c097fe43ed2e785a6e05743cc261c2d43a75586607a074ca9db5f525cfff430414c40e94c4883ef2f2c0f38d7bc265dfe48185c9dc373fefd06d7f313f5f7abd9f0d63b537360b1ba7102711bc4f23667940b47bbaaa4b3af6fb5d198e25f0d5a0ba5f766e10a77a1031a53fdfc57fa6ac921b1a645964a09e6f10b94e9d45c54ddc7e5d19e9e83b5ec92f1d44540ba101a1338e54678fa5974a99130d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:12:9b:69:99:c3:39:dc:94:80:57:bd:60:83:f1:5b:93:47:c2:72] modulus: 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 public exponent: 10001 ] 2021-11-10 03:15:16.773 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:15:16.774 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:15:16.775 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-10 03:15:16.776 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:15:16.776 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-10 03:15:16.776 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:15:16.777 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:15:16.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:15:16.777 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:15:16.778 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:15:16.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:15:16.782 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:16.783 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:16.783 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:16.868 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:15:16.869 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:15:16.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:15:16.869 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:16.870 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:15:16.871 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:15:16.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:16.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:16.871 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:16.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:16.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:16.872 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:16.873 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:16.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:16.874 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:16.875 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:15:16.877 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:21:68:1c:7e:2f:14:9a:f9:0a:ec:98:47:af:87:e6:fa:f5:06:29] modulus: a393482b67af78c3ba1819f2a0b89bf7c5fcce7ec6cf9543a64cd5e97caf056033ea201cdbb8ce8c5bef96846a97520df3445dbe4d96bcdb54ec8529431cbf00acaa3d52da42545e65590d9bf2637039b3f618a9bc0fbbecc1b6427a003b91a2dd345d22d09928d1d1ba8a0078d201cff6e70f249d4c738ca7554eebdab798f88da7927a2c5fe73d44d515ea88764fa8d766e35b3b76ff2cfe9fe92ca5cdbe821636d33445ce5c38b7060466dc42d1e3ffc032f703f9a5e9a2ba14229ddbf31c82e6f175d5646dfe4e6f9e8b7e00dede539fb81428e748918b70d5d2c481fb403f79f8fe92e91636c1a35dc5205fa97fbb83f26fe2b03c63b22587d6f623d1ef public exponent: 10001 ] 2021-11-10 03:15:50.319 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:15:50.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:15:50.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-10 03:15:50.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:15:50.322 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-10 03:15:50.323 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:15:50.323 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:15:50.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:15:50.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:15:50.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:15:50.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:15:50.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:50.328 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:50.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:50.402 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:15:50.403 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:15:50.403 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:15:50.404 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:50.405 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:15:50.463 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:15:50.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:50.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:50.464 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:50.465 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:50.465 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:50.466 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:50.466 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:50.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:50.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:50.468 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:15:50.470 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:6e:ae:3a:6c:f7:59:70:a5:1e:d9:ed:66:52:14:c1:f2:f1:4c:41] modulus: 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 public exponent: 10001 ] 2021-11-10 03:15:51.706 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:15:51.707 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:15:51.708 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-10 03:15:51.709 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:15:51.710 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-10 03:15:51.710 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:15:51.711 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:15:51.711 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:15:51.711 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:15:51.712 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:15:51.716 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:15:51.717 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:51.717 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:15:51.717 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:51.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:15:51.783 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:15:51.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:15:51.783 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:15:51.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:15:51.785 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:15:51.785 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:51.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:51.786 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:51.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:51.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:51.787 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:51.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:15:51.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:15:51.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:15:51.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:15:51.792 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:5d:54:a9:b3:77:ca:fa:75:ab:97:93:04:1b:12:4a:99:96:28:3a] modulus: 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 public exponent: 10001 ] 2021-11-10 03:17:33.812 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-10 03:17:33.813 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-10 03:17:33.815 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 03:17:33.816 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 03:17:33.816 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 03:17:33.817 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-10 03:17:33.817 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-10 03:17:33.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-10 03:17:33.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-10 03:17:33.818 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-10 03:17:33.822 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-10 03:17:33.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:17:33.823 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-10 03:17:33.824 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:17:33.938 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-10 03:17:33.938 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-10 03:17:33.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-10 03:17:33.939 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 03:17:33.940 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-10 03:17:33.940 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-10 03:17:33.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:17:33.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:17:33.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:17:33.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:17:33.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:17:33.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:17:33.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 03:17:33.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-10 03:17:33.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-10 03:17:33.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 03:17:33.946 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 605933948744249727196779252422763038534724416227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 01:32:38 UTC 2021 Final Date: Mon Nov 10 01:32:37 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5c:d0:9b:2a:24:58:0b:e2:23:39:06:be:55:69:db:2e:a6:d0:db:4a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7babc3310067713043d7810c83502865074829 2b39fca1374230ff5153e68f577b35fa933f06ed 715a6b0500902d35b8b6e49e4890377d7b4acfa7 b100cc66334bb855801535433b4f6f9e6a306de1 544ab8a66d315032f0e4826021e411dd05b91373 3fdd3f9136a24a0f03b154eef25001549f601537 9ea3b8dd50150222f86d4e928bff8f9ce3056172 e0c5136e3cab2bfc5d3187e25665292604d8e55e 9d25a8be9368c0fcc3e716996fadad117a643039 a058e5652669464cccf0c56ea20ee6bed8df12ff 475601a07d8e267e109947f3f6582584c2b5a52d ded4c7cdb4d20bb380b03add76f3c033fffe4e16 fd44b419f292571abbe774e9045a35dc5cf99621 03f21d38036ff6848e70b2356c420bab2cca62d9 d39b70c8df5a6512f1c9eb6ca93135dcd15c873d f36280be9155247d87b1be1890bbeed92cd18533 754a4fd039c045aea05565eb895c5f573078fd24 110bddbf29ac970afe5dc95b5dacedfc9830f580 2388c17d1e8d1289fcc576d66061bba5b39cf6ca 6ec15812 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:f6:62:d2:10:5b:9a:d8:08:9f:b9:78:7d:84:77:00:5d:10:cd:67] modulus: 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 public exponent: 10001 ]