By type
2021-11-28 01:39:14,935 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-28 01:39:19,623 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-28 01:39:22.938 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default 2021-11-28 01:39:36.922 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-28 01:39:38.435 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2021-11-28 01:39:39.231 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-28 01:39:51.447 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 39.011 seconds (JVM running for 46.916) 2021-11-28 01:40:30.041 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 01:40:30.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 01:40:30.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-28 01:40:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 01:40:30.430 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-28 01:40:30.432 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 01:40:30.433 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 01:40:30.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 01:40:30.522 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 01:40:30.526 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 01:40:30.533 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 01:40:30.536 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 01:40:30.735 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 01:40:30.824 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 01:40:30.825 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 01:40:30.829 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 01:40:32.318 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 01:40:32.321 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 01:40:32.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 01:40:32.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 01:40:32.330 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 01:40:32.331 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 01:40:32.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 01:40:32.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 01:40:32.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 01:40:32.344 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 01:40:32.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 01:40:32.419 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 01:40:32.427 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 01:40:32.427 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 01:40:32.428 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 01:40:32.430 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 01:40:32.534 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:8b:8d:82:02:7d:91:6f:49:7a:9b:41:d1:d7:70:5a:34:41:97:98] modulus: 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 public exponent: 10001 ] 2021-11-28 02:59:55.018 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 02:59:55.021 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 02:59:55.024 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-28 02:59:55.026 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 02:59:55.028 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-28 02:59:55.029 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 02:59:55.029 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 02:59:55.030 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 02:59:55.030 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 02:59:55.031 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 02:59:55.040 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 02:59:55.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 02:59:55.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 02:59:55.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 02:59:55.240 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 02:59:55.241 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 02:59:55.241 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 02:59:55.242 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 02:59:55.245 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 02:59:55.246 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 02:59:55.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 02:59:55.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 02:59:55.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 02:59:55.319 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 02:59:55.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 02:59:55.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 02:59:55.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 02:59:55.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 02:59:55.323 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 02:59:55.325 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 02:59:55.332 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: b1e2827d73030e060b698f52b2eb19027a530bb9662a1476fce7920b6a98322731ea361f2edbd39a111e626b5f02672e1d5800896980338f180843e4543ac4c856532810c1a54b1d135a794af7d1010cef09905726d9219f7e29c8b9365106be776ae9525f31521013fdfc305767ed82cfd3b8cff4d283fe1e9825092ead8bd22ef06ec8ec67ab0c268e38f69841245f6b6432b496b40d443aa89519d5414339d4a14048a50f8bcab0f71f6cec57841e4b57d13c4069fbe29dbeac15c86ecbdf46c5b769330ba2a6bae0a47f5fe45899931d58fcc006f2a590fa7ac60ca710ee4c224990c201037e1ff70317242510ff2cf68f5c304c40129a10294f1635839a200edbd503f5f71de312f01bd6790dcdbf1407d31a1e8f7b443cddf0dda4325e664ac84290205b5c1ae149fdd8ff18305e1e54c07b598ae0687bf2b016f13b53610be8962f3ad78138be2ca49e713d67fdc30649522f6f2dba401bcec6c6a426918c679d1609ab75bb6d1f5ad48c3bbb1f93ecf57a5bbdab40ac167e33dbaa7b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:a2:01:e0:df:63:02:32:4a:7a:8d:38:b0:db:cc:2b:c3:9e:ac:a6] modulus: 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 public exponent: 10001 ] 2021-11-28 03:02:02.741 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:02:02.742 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:02:02.744 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-28 03:02:02.745 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:02:02.745 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-28 03:02:02.746 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:02:02.746 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:02:02.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:02:02.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:02:02.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:02:02.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:02:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:02:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:02:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:02:02.910 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:02:02.918 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:02:02.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:02:02.919 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:02:02.922 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:02:02.922 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:02:02.923 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:02:02.923 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:02:02.924 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:02:02.924 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:02:02.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:02:02.925 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:02:02.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:02:02.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:02:02.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:02:02.928 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:02:02.932 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:fa:1e:ce:44:46:06:f4:82:4b:d8:52:f2:6a:79:49:53:0d:5b:a2] modulus: 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 public exponent: 10001 ] 2021-11-28 03:04:30.774 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:04:30.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:04:30.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-28 03:04:30.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:04:30.778 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-28 03:04:30.778 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:04:30.779 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:04:30.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:04:30.779 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:04:30.780 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:04:30.784 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:04:30.818 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:04:30.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:04:30.819 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:04:30.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:04:30.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:04:30.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:04:30.919 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:04:30.921 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:04:30.922 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:04:30.922 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:30.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:30.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:30.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:30.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:30.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:30.926 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:30.926 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:30.927 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:30.928 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:04:30.932 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: b1e2827d73030e060b698f52b2eb19027a530bb9662a1476fce7920b6a98322731ea361f2edbd39a111e626b5f02672e1d5800896980338f180843e4543ac4c856532810c1a54b1d135a794af7d1010cef09905726d9219f7e29c8b9365106be776ae9525f31521013fdfc305767ed82cfd3b8cff4d283fe1e9825092ead8bd22ef06ec8ec67ab0c268e38f69841245f6b6432b496b40d443aa89519d5414339d4a14048a50f8bcab0f71f6cec57841e4b57d13c4069fbe29dbeac15c86ecbdf46c5b769330ba2a6bae0a47f5fe45899931d58fcc006f2a590fa7ac60ca710ee4c224990c201037e1ff70317242510ff2cf68f5c304c40129a10294f1635839a200edbd503f5f71de312f01bd6790dcdbf1407d31a1e8f7b443cddf0dda4325e664ac84290205b5c1ae149fdd8ff18305e1e54c07b598ae0687bf2b016f13b53610be8962f3ad78138be2ca49e713d67fdc30649522f6f2dba401bcec6c6a426918c679d1609ab75bb6d1f5ad48c3bbb1f93ecf57a5bbdab40ac167e33dbaa7b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:e6:84:b4:d3:72:c5:dd:21:20:55:c1:a2:72:ee:07:87:fd:5f:3c] modulus: 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 public exponent: 10001 ] 2021-11-28 03:04:52.354 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:04:52.355 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:04:52.357 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-28 03:04:52.357 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:04:52.358 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-28 03:04:52.359 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:04:52.359 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:04:52.359 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:04:52.360 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:04:52.360 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:04:52.422 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:04:52.423 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:04:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:04:52.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:04:52.528 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:04:52.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:04:52.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:04:52.529 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:04:52.531 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:04:52.531 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:04:52.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:52.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:52.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:52.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:52.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:52.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:52.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:04:52.533 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:04:52.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:04:52.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:04:52.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:02:08:7c:10:a4:b5:68:e5:e1:ec:29:5a:c3:a5:18:cf:11:6f:08] modulus: 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 public exponent: 10001 ] 2021-11-28 03:05:02.720 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:05:02.721 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:05:02.723 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-28 03:05:02.724 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:05:02.724 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-28 03:05:02.725 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:05:02.725 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:05:02.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:05:02.726 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:05:02.727 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:05:02.733 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:05:02.734 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:05:02.734 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:05:02.734 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:05:02.821 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:05:02.822 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:05:02.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:05:02.822 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:05:02.823 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:05:02.824 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:05:02.824 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:02.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:02.825 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:02.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:02.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:02.826 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:02.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:02.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:02.827 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:02.828 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:05:02.831 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:77:60:3e:f9:f8:95:91:c5:5d:82:0c:ea:07:9b:f3:a9:01:90:57] modulus: ea4c27f069d35c213933c1128fce95ac4d9ff171503e3eef9053a012f59afc319e6c77bb6d97bab5b9c6c6dd5c781e48b2319bbb96fa9f28611408b0501ec6799995111413d775fa925980e114d6619ec007971f0a0c2448f1e0c954e93361224c71e72a2365d3ca8e37a63c69aa3935ead932400b3c4de57324854d10687d85354d24f59ce33cde27d5fb6a616fbb69d2b61695b6a4f8d6ee31188f065572f7b041b25361d7da33d6a27fa388025b35eb6f3551545299d79e553aa2c205952671026910e68c1d2da16b0e98b2298cabedf84a177d84bdcca3949ed549e0d731446a6a49cc5da60bbf5025bb01d76c78fb25f6e0db9889ab96083c23411f140b public exponent: 10001 ] 2021-11-28 03:05:36.464 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:05:36.465 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:05:36.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-28 03:05:36.467 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:05:36.468 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-28 03:05:36.469 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:05:36.469 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:05:36.469 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:05:36.469 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:05:36.470 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:05:36.475 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:05:36.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:05:36.476 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:05:36.477 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:05:36.608 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:05:36.618 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:05:36.619 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:05:36.619 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:05:36.621 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:05:36.621 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:05:36.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:36.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:36.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:36.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:36.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:36.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:36.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:05:36.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:05:36.625 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:05:36.626 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:05:36.630 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:36:91:94:87:23:cf:46:6c:2e:d7:b8:ec:f2:bf:bf:83:d5:e9:9d] modulus: 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 public exponent: 10001 ] 2021-11-28 03:06:45.366 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:06:45.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:06:45.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-28 03:06:45.369 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:06:45.369 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-28 03:06:45.370 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:06:45.371 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:06:45.372 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:06:45.372 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:06:45.372 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:06:45.379 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:06:45.380 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:06:45.509 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:06:45.509 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:06:45.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:06:45.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:06:45.511 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:06:45.511 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:06:45.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:06:45.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:06:45.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:06:45.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:06:45.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:06:45.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:06:45.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:06:45.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:06:45.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:06:45.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:06:45.520 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:14:12:e4:1c:39:e8:59:db:08:92:46:47:ca:bb:09:5f:a5:8c:ed] modulus: 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 public exponent: 10001 ] 2021-11-28 03:07:21.872 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2021-11-28 03:07:21.873 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2021-11-28 03:07:21.874 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-28 03:07:21.874 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-28 03:07:21.875 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-28 03:07:21.875 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2021-11-28 03:07:21.875 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2021-11-28 03:07:21.876 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2021-11-28 03:07:21.876 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2021-11-28 03:07:21.876 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2021-11-28 03:07:21.880 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2021-11-28 03:07:21.880 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:07:21.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2021-11-28 03:07:21.881 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:07:22.414 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2021-11-28 03:07:22.415 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2021-11-28 03:07:22.415 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2021-11-28 03:07:22.415 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2021-11-28 03:07:22.417 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2021-11-28 03:07:22.418 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2021-11-28 03:07:22.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:07:22.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:07:22.419 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:07:22.420 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:07:22.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:07:22.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:07:22.422 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-28 03:07:22.422 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2021-11-28 03:07:22.423 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2021-11-28 03:07:22.424 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-28 03:07:22.430 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 366420119590821394943674583817179154089109739203 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 28 01:30:10 UTC 2021 Final Date: Fri Nov 28 01:30:09 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [18:68:c4:14:e8:64:53:21:6d:2d:a9:a7:11:12:d8:09:2b:72:31:68] modulus: b1e2827d73030e060b698f52b2eb19027a530bb9662a1476fce7920b6a98322731ea361f2edbd39a111e626b5f02672e1d5800896980338f180843e4543ac4c856532810c1a54b1d135a794af7d1010cef09905726d9219f7e29c8b9365106be776ae9525f31521013fdfc305767ed82cfd3b8cff4d283fe1e9825092ead8bd22ef06ec8ec67ab0c268e38f69841245f6b6432b496b40d443aa89519d5414339d4a14048a50f8bcab0f71f6cec57841e4b57d13c4069fbe29dbeac15c86ecbdf46c5b769330ba2a6bae0a47f5fe45899931d58fcc006f2a590fa7ac60ca710ee4c224990c201037e1ff70317242510ff2cf68f5c304c40129a10294f1635839a200edbd503f5f71de312f01bd6790dcdbf1407d31a1e8f7b443cddf0dda4325e664ac84290205b5c1ae149fdd8ff18305e1e54c07b598ae0687bf2b016f13b53610be8962f3ad78138be2ca49e713d67fdc30649522f6f2dba401bcec6c6a426918c679d1609ab75bb6d1f5ad48c3bbb1f93ecf57a5bbdab40ac167e33dbaa7b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 335e141149d515405cb0664a0066ea209b1af897 122c46be9367cc2d5839a20acb36aa91beedd08d 9161aaae4ab630235e41bfb794a945db855a2cf2 ca85c10e6b7bee51fafdea0daa7e220d134dda54 8b4a273b917e54040325d78801e6edb578b22ac3 f87c50ec7a68e3b33558d53159998dc8fa1b2406 1cb6f3a9e162e86d6b14110ff0c170943ae718d8 9b98c3d7377b1639d63c86d0ffe75f0db6fe62eb 5ce227305b15404f0962cc7ccada0f52b2f34aa1 9dc8af322075df4acffe123f49b2eeda87e29f6f 96aada60568018d159a535d0666bc0b1ac0de5fb 555e40cf248bfc1c3c623f989644eaf20d04dfa8 7436fbb5f77740919a97f9701e1d09816eeda022 7725eb0c8b04ba6600bf251cd7753c0a6e65d2a5 c0d0f5aaf208a1d36718da46511d38d0cbf15ad4 d6f451d63def62c1b79fe78a6619cab8b37b9ef5 3941802c9bb5e283cbca24e161243b330ab217d8 4ac205041c7964f323c423bf7a4d2ec061ced5b7 7c6d4c9dc3dda148a5d8b3d5c83ce1015e285d19 db863d19 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:64:1e:61:2b:74:2f:bd:83:d6:fa:8e:ca:7f:a4:78:95:f3:f5:52] modulus: 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 public exponent: 10001 ]